Page 162 of 17392 results (0.268 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: btrfs: prevent copying too big compressed lzo segment Compressed length can be corrupted to be a lot larger than memory we have allocated for buffer. This will cause memcpy in copy_compressed_segment to write outside of allocated memory. ... /include/linux/jump_label.h:212 .... /include/linux/jump_label.h:212 .... /include/linux/list.h:292 kernel/workqueue.c:2455) kernel: ? /include/linux/list.h:292 kernel... • https://git.kernel.org/stable/c/8df508b7a44cd8110c726057cd28e8f8116885eb •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: riscv: fix oops caused by irqsoff latency tracer The trace_hardirqs_{on,off}() require the caller to setup frame pointer properly. ... In the Linux kernel, the following vulnerability has been resolved: riscv: fix oops caused by irqsoff latency tracer The trace_hardirqs_{on,off}() require the caller to setup frame pointer properly. • https://git.kernel.org/stable/c/3c46979829824da5af8766d89fa877976bdae884 •

CVSS: 4.7EPSS: 0%CPEs: 5EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix fault in reweight_entity Syzbot found a GPF in reweight_entity. ... In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix fault in reweight_entity Syzbot found a GPF in reweight_entity. • https://git.kernel.org/stable/c/c85c6fadbef0a3eab41540ea628fa8fe8928c820 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

22 Aug 2024 — An alternative would be to call btrfs_start_delalloc_roots() with a number of pages different from LONG_MAX, for example matching the number of delalloc bytes we currently have, in ---truncated--- In the Linux kernel, the following vulnerability has been resolved: btrfs: get rid of warning on transaction commit when using flushoncommit When using the flushoncommit mount option, during almost every transaction commit we trigger a warning from __writeback_inodes_sb_nr(): $ cat fs/fs-writeback.c: (...) ... • https://git.kernel.org/stable/c/850a77c999b81dd2724efd2684068d6f90db8c16 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free the context. In this situation we should not proceed to enter the out: section in cifs_smb3_do_mount() and free the same resources a second time. ... • https://git.kernel.org/stable/c/da834d6c1147c7519a9e55b510a03b7055104749 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: iwlwifi: mvm: check debugfs_dir ptr before use When "debugfs=off" is used on the kernel command line, iwiwifi's mvm module uses an invalid/unchecked debugfs_dir pointer and causes a BUG: BUG: kernel NULL pointer dereference, address: 000000000000004f #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP CPU: 1 PID: 503 Comm: modprobe Tainted: G W 5.17.0-rc5 #7 Ha... • https://git.kernel.org/stable/c/8c082a99edb997d7999eb7cdb648e47a2bf4a638 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min While the $val/$val2 values passed in from userspace are always >= 0 integers, the limits of the control can be signed integers and the $min can be non-zero and less than zero. In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min While the $val/$val2 values passed in from userspace are alwa... • https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix double list_add when enabling VMD in scalable mode When enabling VMD and IOMMU scalable mode, the following kernel panic call trace/kernel log is shown in Eagle Stream platform (Sapphire Rapids CPU) during booting: pci 0000:59:00.5: Adding to iommu group 42 ... • https://git.kernel.org/stable/c/474dd1c6506411752a9b2f2233eec11f1733a099 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference Do not call get_trip_hyst() from thermal_genl_cmd_tz_get_trip() if the thermal zone does not define one. In the Linux kernel, the following vulnerability has been resolved: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference Do not call get_trip_hyst() from thermal_genl_cmd_tz_get_trip() if the thermal zone does not define one. • https://git.kernel.org/stable/c/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

22 Aug 2024 — In the Linux kernel, the following vulnerability has been resolved: xen/netfront: destroy queues before real_num_tx_queues is zeroed xennet_destroy_queues() relies on info->netdev->real_num_tx_queues to delete queues. ... Originally reported at https://github.com/QubesOS/qubes-issues/issues/7257 In the Linux kernel, the following vulnerability has been resolved: xen/netfront: destroy queues before real_num_tx_queues is zeroed xennet_destroy_queues() relies on info->netdev->real_num_tx_queues t... • https://git.kernel.org/stable/c/35cad2003b6447932cfe91f795090586306738e8 •