Page 241 of 52831 results (0.139 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/7b815817aa58d2e2101feb2fcf64c60cae0b2695 •

CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1172d5b8beca6b899deb9f7f2850e7e47ec16198 •

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/ccf74f2390d60a2f9a75ef496d2564abb478f46a •

CVSS: 7.3EPSS: 0%CPEs: 4EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/ccf74f2390d60a2f9a75ef496d2564abb478f46a •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/05e2600cb0a4d73b0779cf29512819616252aeeb •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

29 Oct 2024 — [ 117.213640] Call trace: [ 117.216783] tegra_xusb_enter_elpg+0x23c/0x658 [ 117.222021] tegra_xusb_runtime_suspend+0x40/0x68 [ 117.227260] pm_generic_runtime_suspend+0x30/0x50 [ 117.232847] __rpm_callback+0x84/0x3c0 [ 117.237038] rpm_suspend+0x2dc/0x740 [ 117.241229] pm_runtime_work+0xa0/0xb8 [ 117.245769] process_scheduled_works+0x24c/0x478 [ 117.251007] worker_thread+0x23c/0x328 [ 117.255547] kthread+0x104/0x1b0 [ 117.259389] ret_from_fork+0x10/0x20 [ 117.263582] Code: 54000222 f9461ae8 f8747908 b4... • https://git.kernel.org/stable/c/a30951d31b250bf3479c00e93646b6cc6fb42a56 •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

29 Oct 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/166a0bddcc27de41fe13f861c8348e8e53e988c8 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/bf171b5e86e41de4c1cf32fb7aefa275c3d7de49 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

29 Oct 2024 — This is because segment registers with an arbitrary user value can result in #GP when executing VERW. This is because segment registers with an arbitrary user value can result in #GP when executing VERW. ... This ensures VERW will not #GP for an arbitrary user %ds. This ensures VERW will not #GP for an arbitrary user %ds. [ mingo: Fixed the SOB chain. ] In the Linux kernel, the following vulnerability has been resolved: x86/bugs: Use code segment selector for VERW operand ... • https://git.kernel.org/stable/c/50f021f0b985629accf10481a6e89af8b9700583 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

29 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/f805e356313bbcafef48808c14eb9ce7f4ff2560 •