Page 268 of 52954 results (0.252 seconds)

CVSS: 4.7EPSS: 0%CPEs: 5EXPL: 0

21 Oct 2024 — Additionally this does not validate whether the code path did any perm checking to begin with -- it will pass if the inode happens to be regular. ... Additionally this does not validate whether the code path did any perm checking to begin with -- it will pass if the inode happens to be regular. ... An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/c9b77438077d5a20c79ead95bcdaf9bd4797baaf •

CVSS: 9.4EPSS: 0%CPEs: 3EXPL: 0

21 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/ec437d71db77a181227bf6d0ac9d4a80e58ecf0f •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

21 Oct 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/b55c8848fdc81514ec047b2a0ec782ffe9ab5323 •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

21 Oct 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/a6bdb691cf7b66dcd929de1a253c5c42edd2e522 •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

21 Oct 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/4192adefc9c570698821c5eb9873320eac2fcbf1 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

21 Oct 2024 — An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/e2c3e6f53a7a8a00ffeed127cfd1b397c3b016f8 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

21 Oct 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/eb9329cd882aa274e92bdb1003bc088433fdee86 •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

21 Oct 2024 — If that allocation fails the function returns with an error code and the module core invokes static_call_del_module() to clean up eventually added static_call_mod entries. If that allocation fails the function returns with an error code and the module core invokes static_call_del_module() to clean up eventually added static_call_mod entries. ... • https://git.kernel.org/stable/c/9183c3f9ed710a8edf1a61e8a96d497258d26e08 •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

21 Oct 2024 — In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix error path in multi-packet WQE transmit Remove the erroneous unmap in case no DMA mapping was established The multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix error path in multi-packet WQE transmit Remove the erroneous unmap in case no DMA mapping was established The multi-packet WQE transmit code attemp... • https://git.kernel.org/stable/c/5af75c747e2a868abbf8611494b50ed5e076fca7 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

21 Oct 2024 — A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/a6696735d694b365bca45873e9dbca26120a8375 •