Page 59 of 24908 results (0.033 seconds)

CVSS: 7.3EPSS: 0%CPEs: 8EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy ioctl memory to kernelspace The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. • https://git.kernel.org/stable/c/3c8a63e22a0802fd56380f6ab305b419f18eb6f5 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access and incorrect handling of integer values whose size is not 4 bytes. • https://git.kernel.org/stable/c/b59d0bae6ca30c496f298881616258f9cde0d9c6 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). • https://git.kernel.org/stable/c/e234088758fca3a669ebb1a02d8bf7bf60f0e4ff •

CVSS: -EPSS: 0%CPEs: 5EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid mapping wrong physical block for swapfile Xiaolong Guo reported a f2fs bug in bugzilla [1] [1] https://bugzilla.kernel.org/show_bug.cgi? • https://git.kernel.org/stable/c/40d76c393cca83938b11eb7ca8983aa3cd0ed69b •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: block cache/dio write during f2fs_enable_checkpoint()" This reverts commit 196c81fdd438f7ac429d5639090a9816abb9760a. • https://git.kernel.org/stable/c/196c81fdd438f7ac429d5639090a9816abb9760a •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump:... • https://git.kernel.org/stable/c/1b81e7f3019d632a707e07927e946ffbbc102910 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

04 Mar 2026 — In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy() with no RCU grace period in between. • https://git.kernel.org/stable/c/91c7b38dc9f0de4f7f444b796d14476bc12df7bc •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

03 Mar 2026 — Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server. • https://github.com/canonical/lxd/commit/d936c90d47cf0be1e9757df897f769e9887ebde1 • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

27 Feb 2026 — telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. • https://git.hadrons.org/cgit/debian/pkgs/inetutils.git/commit/?id=3953943d8296310485f98963883a798545ab9a6c • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

26 Feb 2026 — Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. ... Antes de la versión 7.5.8, una vulnerabilidad de salto de ruta con barra invertida en 'LocalFolderExtractor' permite a un atacante escribir archivos arbitrarios con contenido controlado por el atacante en cualquier lugar del sistema de archivos cuando... • https://github.com/junrar/junrar/commit/947ff1d33f00f940aa68ae2593500291d799d954 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •