Page 208 of 52752 results (0.239 seconds)

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/0c4dcd602817502bb3dced7a834a13ef717d65a4 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/0c4dcd602817502bb3dced7a834a13ef717d65a4 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/8e7b58c27b3c567316a51079b375b846f9223bba •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/c57e558194430d10d5e5f4acd8a8655b68dade13 •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/826b5de90c0bca4e9de6231da9e1730480621588 •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1901c92497bd90caf608a474f1bf4d8795b372a2 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

08 Nov 2024 — In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix address emission with tag-based KASAN enabled When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image struct on the stack is passed during the size calculation pass and an address on the heap is passed during code generation. In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix address emission with tag-based KASAN enabled When BPF_TRAMP_F_CALL_ORIG is enabled, the addres... • https://git.kernel.org/stable/c/19d3c179a37730caf600a97fed3794feac2b197b •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 0

08 Nov 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/2ba466d74ed74f073257f86e61519cb8f8f46184 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/74d2aacbe84042d89f572a3112a146fca05bfcb1 •

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

08 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/54a611b605901c7d5d05b6b8f5d04a6ceb0962aa •