Page 214 of 52752 results (0.164 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/0ac20faf5d837b59fb4c041ea320932ed47fd67f •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/80105befdb4b8cea924711b40b2462b87df65b62 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/490cb412007de593e07c1d3e2b1ec4233886707c •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/634f1a7110b439c65fd8a809171c1d2d28bcea6f •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/760c295e0e8d982917d004c9095cff61c0cbd803 •

CVSS: 5.6EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/3933961682a30ae7d405cda344c040a129fea422 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/6c1752e0b6ca8c7021d6da3926738d8d88f601a9 •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

07 Nov 2024 — In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overloading of MEM_UNINIT's meaning Lonial reported an issue in the BPF verifier where check_mem_size_reg() has the following code: if (!... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overloading of MEM_UNINIT's meaning Lonial reported an issue in the BPF verifier where check_mem_size_reg() has the following code: if (!... • https://git.kernel.org/stable/c/7b3552d3f9f6897851fc453b5131a967167e43c2 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — However, different code paths using identically-numbered flag values in the same struct field still seems like a bit of a mess, so this patch cleans that up by moving the flag definitions together and redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap with the flags used for XDP. However, different code paths using identically-numbered flag values in the same struct field still seems like a bit of a mess, so this patch cleans that up by moving the flag definitions together an... • https://git.kernel.org/stable/c/e624d4ed4aa8cc3c69d1359b0aaea539203ed266 •