0.0

CVE-2026-31538 - smb: server: make use of smbdirect_socket.recv_io.credits.available

In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.recv_io.credits.available The logic off managing recv credits by counting posted recv_io and granted credits is racy. That's because the peer might already consumed a credit, but between…

📅 Published: April 24, 2026, 2:30 p.m. 🔄 Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31537 - smb: server: make use of smbdirect_socket.send_io.bcredits

In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (empty) send. In order to fix this we'll have a sin…

📅 Published: April 24, 2026, 2:30 p.m. 🔄 Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31536 - smb: server: let send_done handle a completion without IB_SEND_SIGNALED

In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED…

📅 Published: April 24, 2026, 2:30 p.m. 🔄 Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31535 - smb: client: make use of smbdirect_socket.recv_io.credits.available

In the Linux kernel, the following vulnerability has been resolved: smb: client: make use of smbdirect_socket.recv_io.credits.available The logic off managing recv credits by counting posted recv_io and granted credits is racy. That's because the peer might already consumed a credit, but between…

📅 Published: April 24, 2026, 2:30 p.m. 🔄 Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31534 - smb: client: let send_done handle a completion without IB_SEND_SIGNALED

In the Linux kernel, the following vulnerability has been resolved: smb: client: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED…

📅 Published: April 24, 2026, 2:30 p.m. 🔄 Last Modified: April 24, 2026, 5:51 p.m.

9.3

CVSS4.0

CVE-2026-25660 - Authentication bypass for certain API calls

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the URL ends with Authentication with certain function calls.  This bypass allows assigning arbitrary permission to any user existing in CodeChec…

📅 Published: April 24, 2026, 1:10 p.m. 🔄 Last Modified: April 24, 2026, 2:39 p.m.

9.9

CVSS3.1

CVE-2026-21515 - Azure IoT Central Elevation of Privilege Vulnerability

Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network.

📅 Published: April 24, 2026, 12:51 p.m. 🔄 Last Modified: April 24, 2026, 2:39 p.m.

4.3

CVSS3.1

CVE-2026-38743 - Apache Airflow: Dags endpoint might provide access to otherwise inaccessible entities

The authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance records: a logged-in Airflow user with read access to at least one DAG could retrieve HITL prompts (including their request parameters) and full TaskInstance details for …

📅 Published: April 24, 2026, 12:36 p.m. 🔄 Last Modified: April 24, 2026, 4:20 p.m.

4.3

CVSS3.1

CVE-2026-40690 - Apache Airflow: Assets graph view bypasses DAG level access control displaying unrelated topologies…

The asset dependency graph did not restrict nodes by the viewer's DAG read permissions: a user with read access to at least one DAG could browse the asset graph for any other asset in the deployment and learn the existence and names of DAGs and assets outside their authorized scope. Users are reco…

📅 Published: April 24, 2026, 12:35 p.m. 🔄 Last Modified: April 24, 2026, 4:16 p.m.

6.5

CVSS3.1

CVE-2026-5265 - Ovn: ovn: heap over-read in icmp error response generation - security issue

When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer s…

📅 Published: April 24, 2026, 12:25 p.m. 🔄 Last Modified: April 24, 2026, 6:21 p.m.
Total resulsts: 347629
Page 131 of 34,763
« previous page » next page
Filters