9.8

CVSS3.1

CVE-2026-31649 - net: stmmac: fix integer underflow in chain mode

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix integer underflow in chain mode The jumbo_frm() chain-mode implementation unconditionally computes len = nopaged_len - bmax; where nopaged_len = skb_headlen(skb) (linear bytes only) and bmax is BUF_SIZE_8Ki…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 8:13 p.m.

5.5

CVSS3.1

CVE-2026-31647 - idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling

In the Linux kernel, the following vulnerability has been resolved: idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling Switch from using the completion's raw spinlock to a local lock in the idpf_vc_xn struct. The conversion is safe because complete/_all() are called outside the lo…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 8:18 p.m.

7.8

CVSS3.1

CVE-2026-31641 - rxrpc: Fix RxGK token loading to check bounds

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix RxGK token loading to check bounds rxrpc_preparse_xdr_yfs_rxgk() reads the raw key length and ticket length from the XDR token as u32 values and passes each through round_up(x, 4) before using the rounded value for val…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 8:20 p.m.

9.8

CVSS3.1

CVE-2026-31637 - rxrpc: reject undecryptable rxkad response tickets

In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto_skcipher_decrypt() succeeded. A malformed RESPO…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 8:20 p.m.

7.5

CVSS3.1

CVE-2026-31635 - rxrpc: fix oversized RESPONSE authenticator length check

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix oversized RESPONSE authenticator length check rxgk_verify_response() decodes auth_len from the packet and is supposed to verify that it fits in the remaining bytes. The existing check is inverted, so oversized RESPONSE…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 8:30 p.m.

7.1

CVSS3.1

CVE-2026-31626 - staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using uninitialized data. Smatch warns that only 6 bytes are copied to this 8-byte (u64) variable, leaving th…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 2:16 p.m.

7.0

CVSS3.1

CVE-2026-31614 - smb: client: fix off-by-8 bounds check in check_wsl_eas()

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(struct smb2_file_full_ea_info) = 8 from ea, not at …

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 1:56 p.m.

7.5

CVSS3.1

CVE-2026-31612 - ksmbd: validate EaNameLength in smb2_get_ea()

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without verifying that the length of the name really is t…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 2:16 p.m.

8.6

CVSS3.1

CVE-2026-31611 - ksmbd: require 3 sub-authorities before reading sub_auth[2]

In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If sid_unix_NFS_mode is the prefix S-1-5-88-3 with num…

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 2:16 p.m.

0.0

CVE-2026-31603 - staging: sm750fb: fix division by zero in ps_to_hz()

In the Linux kernel, the following vulnerability has been resolved: staging: sm750fb: fix division by zero in ps_to_hz() ps_to_hz() is called from hw_sm750_crtc_set_mode() without validating that pixclock is non-zero. A zero pixclock passed via FBIOPUT_VSCREENINFO causes a division by zero. Fix …

πŸ“… Published: April 24, 2026, midnight πŸ”„ Last Modified: April 27, 2026, 1:56 p.m.
Total resulsts: 347407
Page 111 of 34,741
Β« previous page Β» next page
Filters