Page 205 of 3977 results (0.012 seconds)

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to check validation of fault attrs in parse_options(), let's fix to add check condition in f2fs_build_fault_attr(). - Use f2fs_build_fault_attr() in __sbi_store() to clean up code. • https://git.kernel.org/stable/c/bc84dd2c33e0c10fd90d60f0cfc0bfb504d4692d https://git.kernel.org/stable/c/44958ca9e400f57bd0478115519ffc350fcee61e https://git.kernel.org/stable/c/ecb641f424d6d1f055d149a15b892edcc92c504b https://git.kernel.org/stable/c/4ed886b187f47447ad559619c48c086f432d2b77 •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, values larger then size of this field shouldn't be allowed. • https://git.kernel.org/stable/c/b869ec89d2ee923d46608b76e54c006680c9b4df https://git.kernel.org/stable/c/586b41060113ae43032ec6c4a16d518cef5da6e0 https://git.kernel.org/stable/c/c8707901b53a48106d7501bdbd0350cefaefa4cf https://git.kernel.org/stable/c/3668651def2c1622904e58b0280ee93121f2b10b •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_explicit() and kfree() with kfree_sensitive() to fix warnings reported by Coccinelle: WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1506) WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1643) WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1770) • https://git.kernel.org/stable/c/62151a0acde90823bdfa991d598c85cf4b1d387d https://git.kernel.org/stable/c/22e6824622e8a8889df0f8fc4ed5aea0e702a694 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe sensitive data on failure Wipe sensitive data from stack also if the copy_to_user() fails. • https://git.kernel.org/stable/c/6e2e374403bf73140d0efc9541cb1b3bea55ac02 https://git.kernel.org/stable/c/b5eb9176ebd4697bc248bf8d145e66d782cf5250 https://git.kernel.org/stable/c/93c034c4314bc4c4450a3869cd5da298502346ad https://git.kernel.org/stable/c/4889f117755b2f18c23045a0f57977f3ec130581 https://git.kernel.org/stable/c/c51795885c801b6b7e976717e0d6d45b1e5be0f0 https://git.kernel.org/stable/c/90a01aefb84b09ccb6024d75d85bb8f620bd3487 https://git.kernel.org/stable/c/c44a2151e5d21c66b070a056c26471f30719b575 https://git.kernel.org/stable/c/1d8c270de5eb74245d72325d285894a57 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive data from stack for all IOCTLs, which convert a clear-key into a protected- or secure-key. • https://git.kernel.org/stable/c/7f6243edd901b75aaece326c90a1cc0dcb60cc3d https://git.kernel.org/stable/c/d65d76a44ffe74c73298ada25b0f578680576073 •