Page 283 of 47800 results (0.412 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/8887b94d93224e0ef7e1bc6369640e313b8b12f4 •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/85ce2c517ade0d51b7ad95f2e88be9bbe294379a •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/df4e817b710809425d899340dbfa8504a3ca4ba5 • CWE-99: Improper Control of Resource Identifiers ('Resource Injection') •

CVSS: 4.7EPSS: 0%CPEs: 8EXPL: 0

12 Jul 2024 — CONFIG_IMA_LSM_RULES] In the Linux kernel, the following vulnerability has been resolved: ima: Avoid blocking in RCU read-side critical section A panic happens in ima_match_policy: BUG: unable to handle kernel NULL pointer dereference at 0000000000000010 PGD 42f873067 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 5 PID: 1286325 Comm: kubeletmonit.sh Kdump: loaded Tainted: P Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 RIP: 0010:ima_match_policy+0x84/0x450 Code: 49 89 fc 41 89 c... • https://git.kernel.org/stable/c/c4b035b1f036ddd53fbfced49046e586c5ad8a3e •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/5d8213864ade86b48fc492584ea86d65a62f892e •

CVSS: 4.7EPSS: 0%CPEs: 8EXPL: 0

12 Jul 2024 — In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix races between hole punching and AIO+DIO After commit "ocfs2: return real error code in ocfs2_dio_wr_get_block", fstests/generic/300 become from always failed to sometimes failed: ======================================================================== [ 473.293420 ] run fstests generic/300 [ 475.296983 ] JBD2: Ignoring recovery information on journal [ 475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) wit... • https://git.kernel.org/stable/c/b25801038da5823bba1b5440a57ca68afc51b6bd •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/352899f384d4aefa77ede6310d08c1b515612a8f • CWE-99: Improper Control of Resource Identifiers ('Resource Injection') •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

12 Jul 2024 — In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail In case of region creation fail in ipc_devlink_create_region(), previously created regions delete process starts from tainted pointer which actually holds error code value. In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail In case of region creation fail in ipc_devli... • https://git.kernel.org/stable/c/4dcd183fbd67b105decc8be262311937730ccdbf • CWE-99: Improper Control of Resource Identifiers ('Resource Injection') •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/b91c3e4ea756b12b7d992529226edce1cfd854d7 •

CVSS: 5.1EPSS: 0%CPEs: 3EXPL: 0

12 Jul 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/6e099264185d05f50400ea494f5029264a4fe995 • CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak') •