6.6

CVSS3.1

CVE-2021-47230 - KVM: x86: Immediately reset the MMU context when the SMM flag is cleared

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Immediately reset the MMU context when the SMM flag is cleared Immediately reset the MMU context when the vCPU's SMM flag is cleared so that the SMM flag in the MMU role is always synchronized with the vCPU's flag. If …

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:06 a.m.

5.5

CVSS3.1

CVE-2021-47333 - misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge

In the Linux kernel, the following vulnerability has been resolved: misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge There is an issue with the ASPM(optional) capability checking function. A device might be attached to root complex directly, in this case, bus->self(bridge) will be …

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 18, 2025, 11:36 a.m.

5.5

CVSS3.1

CVE-2023-52747 - IB/hfi1: Restore allocated resources on failed copyout

In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Restore allocated resources on failed copyout Fix a resource leak if an error occurs.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Sept. 23, 2025, 7:10 p.m.

5.5

CVSS3.1

CVE-2023-52759 - kernel: gfs2: ignore negated quota changes

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 19, 2024, 11:15 a.m.

5.5

CVSS3.1

CVE-2021-47412 - block: don't call rq_qos_ops->done_bio if the bio isn't tracked

In the Linux kernel, the following vulnerability has been resolved: block: don't call rq_qos_ops->done_bio if the bio isn't tracked rq_qos framework is only applied on request based driver, so: 1) rq_qos_done_bio() needn't to be called for bio based driver 2) rq_qos_done_bio() needn't to be cal…

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 18, 2025, 11:37 a.m.

5.5

CVSS3.1

CVE-2021-47283 - net:sfc: fix non-freed irq in legacy irq mode

In the Linux kernel, the following vulnerability has been resolved: net:sfc: fix non-freed irq in legacy irq mode SFC driver can be configured via modparam to work using MSI-X, MSI or legacy IRQ interrupts. In the last one, the interrupt was not properly released on module remove. It was not fre…

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 18, 2025, 11:36 a.m.

7.1

CVSS3.1

CVE-2021-47277 - kvm: avoid speculation-based attacks from out-of-range memslot accesses

In the Linux kernel, the following vulnerability has been resolved: kvm: avoid speculation-based attacks from out-of-range memslot accesses KVM's mechanism for accessing guest memory translates a guest physical address (gpa) to a host virtual address using the right-shifted gpa (also known as gfn…

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 18, 2025, 11:36 a.m.

7.5

CVSS3.1

CVE-2024-35059 -

An issue in the Pickle Python library of NASA AIT-Core v2.5.2 allows attackers to execute arbitrary commands.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: June 3, 2025, 2:15 p.m.

5.5

CVSS3.1

CVE-2023-52734 - kernel: net: sched: sch: Bounds check priority

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 28, 2024, 7:15 p.m.

4.4

CVSS3.1

CVE-2023-52878 - can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning …

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:45 a.m.
Total resulsts: 343970
Page 9231 of 34,397
Β« previous page Β» next page
Filters