0.0

CVE-2026-43383 - net/tcp-md5: Fix MAC comparison to be constant-time

In the Linux kernel, the following vulnerability has been resolved: net/tcp-md5: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43382 - batman-adv: Avoid double-rtnl_lock ELP metric worker

In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid double-rtnl_lock ELP metric worker batadv_v_elp_get_throughput() might be called when the RTNL lock is already held. This could be problematic when the work queue item is cancelled via cancel_delayed_work_sync()…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 4 p.m.

0.0

CVE-2026-43381 - nouveau/dpcd: return EBUSY for aux xfer if the device is asleep

In the Linux kernel, the following vulnerability has been resolved: nouveau/dpcd: return EBUSY for aux xfer if the device is asleep If we have runtime suspended, and userspace wants to use /dev/drm_dp_* then just tell it the device is busy instead of crashing in the GSP code. WARNING: CPU: 2 PID…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43380 - hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read

In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read The q54sj108a2_debugfs_read function suffers from a stack buffer overflow due to incorrect arguments passed to bin2hex(). The function currently passes 'data' as the de…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43379 - ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close()

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close() opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is being accessed after rcu_read_unlock() has been called. This creates a race condition where the memory …

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43378 - smb: server: fix use-after-free in smb2_open()

In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free window.

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43377 - ksmbd: Don't log keys in SMB3 signing and encryption key generation

In the Linux kernel, the following vulnerability has been resolved: ksmbd: Don't log keys in SMB3 signing and encryption key generation When KSMBD_DEBUG_AUTH logging is enabled, generate_smb3signingkey() and generate_smb3encryptionkey() log the session, signing, encryption, and decryption key byt…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43376 - ksmbd: fix use-after-free by using call_rcu() for oplock_info

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free by using call_rcu() for oplock_info ksmbd currently frees oplock_info immediately using kfree(), even though it is accessed under RCU read-side critical sections in places like opinfo_get() and proc_show…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43375 - net: mctp: fix device leak on probe failure

In the Linux kernel, the following vulnerability has been resolved: net: mctp: fix device leak on probe failure Driver core holds a reference to the USB interface and its parent USB device while the interface is bound to a driver and there is no need to take additional references unless the struc…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.

0.0

CVE-2026-43374 - net: nexthop: fix percpu use-after-free in remove_nh_grp_entry

In the Linux kernel, the following vulnerability has been resolved: net: nexthop: fix percpu use-after-free in remove_nh_grp_entry When removing a nexthop from a group, remove_nh_grp_entry() publishes the new group via rcu_assign_pointer() then immediately frees the removed entry's percpu stats w…

πŸ“… Published: May 8, 2026, 2:21 p.m. πŸ”„ Last Modified: May 8, 2026, 2:21 p.m.
Total resulsts: 349182
Page 13 of 34,919
Β« previous page Β» next page
Filters