Page 169 of 2605 results (0.010 seconds)

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe sensitive data on failure Wipe sensitive data from stack also if the copy_to_user() fails. • https://git.kernel.org/stable/c/6e2e374403bf73140d0efc9541cb1b3bea55ac02 https://git.kernel.org/stable/c/b5eb9176ebd4697bc248bf8d145e66d782cf5250 https://git.kernel.org/stable/c/93c034c4314bc4c4450a3869cd5da298502346ad https://git.kernel.org/stable/c/4889f117755b2f18c23045a0f57977f3ec130581 https://git.kernel.org/stable/c/c51795885c801b6b7e976717e0d6d45b1e5be0f0 https://git.kernel.org/stable/c/90a01aefb84b09ccb6024d75d85bb8f620bd3487 https://git.kernel.org/stable/c/c44a2151e5d21c66b070a056c26471f30719b575 https://git.kernel.org/stable/c/1d8c270de5eb74245d72325d285894a57 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive data from stack for all IOCTLs, which convert a clear-key into a protected- or secure-key. • https://git.kernel.org/stable/c/7f6243edd901b75aaece326c90a1cc0dcb60cc3d https://git.kernel.org/stable/c/d65d76a44ffe74c73298ada25b0f578680576073 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of protected- and secure-keys Although the clear-key of neither protected- nor secure-keys is accessible, this key material should only be visible to the calling process. So wipe all copies of protected- or secure-keys from stack, even in case of an error. • https://git.kernel.org/stable/c/c746f7ced4ad88ee48d0b6c92710e4674403185b https://git.kernel.org/stable/c/f2ebdadd85af4f4d0cae1e5d009c70eccc78c207 •

CVSS: 4.4EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn't have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated). A vulnerability was found in the Linux kernel's tcp_metrics.c, where insufficient validation of the length of the source address for TCP metrics could lead to incorrect memory read (out of boundary read). • https://git.kernel.org/stable/c/3e7013ddf55af7bc191792b8aea0c2b94fb0fef5 https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9 https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98 https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6 https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3 https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99 https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7 • CWE-130: Improper Handling of Length Parameter Inconsistency •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr When del_timer_sync() is called in an interrupt context it throws a warning because of potential deadlock. The timer is used only to exit from wait_for_completion() after a timeout so replacing the call with wait_for_completion_timeout() allows to remove the problematic timer and its related functions altogether. • https://git.kernel.org/stable/c/41561f28e76a47dc6de0a954da85d0b5c42874eb https://git.kernel.org/stable/c/a349e5ab4dc9954746e836cd10b407ce48f9b2f6 https://git.kernel.org/stable/c/effe0500afda017a86c94482b1e36bc37586c9af https://git.kernel.org/stable/c/2849a1b747cf37aa5b684527104d3a53f1e296d2 https://git.kernel.org/stable/c/3503372d0bf7b324ec0bd6b90606703991426176 https://git.kernel.org/stable/c/3d32327f5cfc087ee3922a3bcdcc29880dcdb50f https://git.kernel.org/stable/c/92e494a7568b60ae80d57fc0deafcaf3a4029ab3 https://git.kernel.org/stable/c/27cd3873fa76ebeb9f948baae40cb9a6d •