Page 279 of 51683 results (0.022 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/490cb412007de593e07c1d3e2b1ec4233886707c •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/634f1a7110b439c65fd8a809171c1d2d28bcea6f • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could possibly trigger this vulnerability to cause a denial of service. ... A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could possibly trigger this vulnerability to cause a denial of service. ... A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/760c295e0e8d982917d004c9095cff61c0cbd803 •

CVSS: 5.6EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/3933961682a30ae7d405cda344c040a129fea422 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/6c1752e0b6ca8c7021d6da3926738d8d88f601a9 •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/97e6d7dab1ca4648821c790a2b7913d6d5d549db •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Asegúrese de que los indicadores bpf_redirect internos y de UAPI no se superpongan El bpf_redirect_info se comparte entre las rutas de redireccionamiento de SKB y XDP, y las dos rutas usan los mismos valores de indicador numérico en el campo ri->flags (específicamente, BPF_F_BROADCAST == BPF_F_NEXTHOP). ... An attacker could use a specially crafted file system image that, when mounted, could cause a denial... • https://git.kernel.org/stable/c/e624d4ed4aa8cc3c69d1359b0aaea539203ed266 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — In the Linux kernel, the following vulnerability has been resolved: bpf: devmap: provide rxq after redirect rxq contains a pointer to the device from where the redirect happened. Currently, the BPF program that was executed after a redirect via BPF_MAP_TYPE_DEVMAP* does not have it set. This is particularly bad since accessing ingress_ifindex, e.g. SEC("xdp") int prog(struct xdp_md *pkt) { return bpf_redirect_map(&dev_redirect_map, 0, 0); } SEC("xdp/devmap") int prog_after_redirect(struct xdp_md *pkt) { bpf... • https://git.kernel.org/stable/c/cb261b594b4108668e00f565184c7c221efe0359 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/20e507724113300794f16884e7e7507d9b4dec68 •