Page 215 of 52758 results (0.214 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/634f1a7110b439c65fd8a809171c1d2d28bcea6f •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

07 Nov 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/760c295e0e8d982917d004c9095cff61c0cbd803 •

CVSS: 5.6EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/3933961682a30ae7d405cda344c040a129fea422 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/6c1752e0b6ca8c7021d6da3926738d8d88f601a9 •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

07 Nov 2024 — In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overloading of MEM_UNINIT's meaning Lonial reported an issue in the BPF verifier where check_mem_size_reg() has the following code: if (!... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overloading of MEM_UNINIT's meaning Lonial reported an issue in the BPF verifier where check_mem_size_reg() has the following code: if (!... • https://git.kernel.org/stable/c/7b3552d3f9f6897851fc453b5131a967167e43c2 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — However, different code paths using identically-numbered flag values in the same struct field still seems like a bit of a mess, so this patch cleans that up by moving the flag definitions together and redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap with the flags used for XDP. However, different code paths using identically-numbered flag values in the same struct field still seems like a bit of a mess, so this patch cleans that up by moving the flag definitions together an... • https://git.kernel.org/stable/c/e624d4ed4aa8cc3c69d1359b0aaea539203ed266 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — SEC("xdp") int prog(struct xdp_md *pkt) { return bpf_redirect_map(&dev_redirect_map, 0, 0); } SEC("xdp/devmap") int prog_after_redirect(struct xdp_md *pkt) { bpf_printk("ifindex %i", pkt->ingress_ifindex); return XDP_PASS; } depends on access to rxq, so a NULL pointer gets dereferenced: <1>[ 574.475170] BUG: kernel NULL pointer dereference, address: 0000000000000000 <1>[ 574.475188] #PF: supervisor read access in kernel mode <1>[ 574.475194] #PF: error_code(0x0000) - not-present page <6>[ 574.475199] PGD 0 ... • https://git.kernel.org/stable/c/cb261b594b4108668e00f565184c7c221efe0359 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/20e507724113300794f16884e7e7507d9b4dec68 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

07 Nov 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/c3d4aed763ce4a39f8ed36c7b7cd9a6a35971329 •