Page 398 of 54932 results (0.246 seconds)

CVSS: 4.4EPSS: 0%CPEs: 4EXPL: 0

19 Jun 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/c5254e72b8edc2ca0a98703e92e8c34959343d2c •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

19 Jun 2024 — A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •

CVSS: 8.8EPSS: 0%CPEs: 7EXPL: 0

19 Jun 2024 — In the Linux kernel, the following vulnerability has been resolved: ALSA: core: Fix NULL module pointer assignment at card init The commit 81033c6b584b ("ALSA: core: Warn on empty module") introduced a WARN_ON() for a NULL module pointer passed at snd_card object creation, and it also wraps the code around it with '#ifdef MODULE'. ... "MODULE" is defined when the target code (i.e. "MODULE" is defined when the target code (i.e. • https://git.kernel.org/stable/c/81033c6b584b44514cbb16fffc26ca29a0fa6270 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

19 Jun 2024 — A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. • https://git.kernel.org/stable/c/487c607df790d366e67a7d6a30adf785cdd98e55 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

19 Jun 2024 — A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. • https://git.kernel.org/stable/c/66637ab137b44914356a9dc7a9b3f8ebcf0b0695 •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

19 Jun 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

19 Jun 2024 — A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. • https://git.kernel.org/stable/c/aa98d7cf59b5b0764d3502662053489585faf2fe •

CVSS: 5.5EPSS: 0%CPEs: 11EXPL: 0

19 Jun 2024 — A local attacker could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/374fb914304d9b500721007f3837ea8f1f9a2418 • CWE-667: Improper Locking •

CVSS: 3.3EPSS: 0%CPEs: 5EXPL: 0

19 Jun 2024 — A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. • https://git.kernel.org/stable/c/967caa3d37c078e5b95a32094657e6a4cad145f0 •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 0

19 Jun 2024 — A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. • https://git.kernel.org/stable/c/b2aae654a4794ef898ad33a179f341eb610f6b85 •