Page 4 of 50592 results (0.037 seconds)

CVSS: 6.9EPSS: 0%CPEs: 6EXPL: 0

20 May 2025 — As a result of lazy binding, we hit a floating-point store in fpe_func almost immediately. As a result of lazy binding, we hit a floating-point store in fpe_func almost immediately. When the T bit is set, an assist exception trap occurs when when the co-processor encounters *any* floating-point instruction except for a double store of register %fr0. When the T bit is set, an assist exception trap occurs when when the co-processor encounters *any* floating-point instruction except for a ... • https://git.kernel.org/stable/c/ec4584495868bd465fe60a3f771915c0e7ce7951 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

20 May 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/71bb244ba2fd5390eefe4ee9054abdb3f8b05922 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

20 May 2025 — In the Linux kernel, the following vulnerability has been resolved: Input: mtk-pmic-keys - fix possible null pointer dereference In mtk_pmic_keys_probe, the regs parameter is only set if the button is parsed in the device tree. In the Linux kernel, the following vulnerability has been resolved: Input: mtk-pmic-keys - fix possible null pointer dereference In mtk_pmic_keys_probe, the regs parameter is only set if the button is parsed in the device tree. ... • https://git.kernel.org/stable/c/b581acb49aec5c3b0af9ab1c537fb73481b79069 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

20 May 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/290a6ce11d938be52634b3ce1bbc6b78be4d23c1 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

20 May 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/801a6e0af0c6cedca2e99155e343ad385a50f08e •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

20 May 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/af8622f6a585d8d82b11cd7987e082861fd0edd3 •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

20 May 2025 — But the window is relatively small and I do not expect this to cause any kind of measurable performance impact. ... But the window is relatively small and I do not expect this to cause any kind of measurable performance impact. ... Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/848b5815177582de0e1d0118725378e0fbadca20 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

20 May 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/6e52d043f7dbf1839a24a3fab2b12b0d3839de7a •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

20 May 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/629dd37acc336ad778979361c351e782053ea284 •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

20 May 2025 — In the Linux kernel, the following vulnerability has been resolved: ipvs: fix uninit-value for saddr in do_output_route4 syzbot reports for uninit-value for the saddr argument [1]. commit 4754957f04f5 ("ipvs: do not use random local source address for tunnels") already implies that the input value of saddr should be ignored but the code is still reading it which can prevent to connect the route. commit 4754957f04f5 ("ipvs: do not use random local source address for tunnels") already implies that the ... • https://git.kernel.org/stable/c/4754957f04f5f368792a0eb7dab0ae89fb93dcfd •