0.0

CVE-2026-31632 - rxrpc: Fix leak of rxgk context in rxgk_verify_response()

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix leak of rxgk context in rxgk_verify_response() Fix rxgk_verify_response() to clean up the rxgk context it creates.

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31631 - rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() Fix rxgk_do_verify_authenticator() to check the buffer size before checking the nonce.

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31630 - rxrpc: proc: size address buffers for %pISpc output

In the Linux kernel, the following vulnerability has been resolved: rxrpc: proc: size address buffers for %pISpc output The AF_RXRPC procfs helpers format local and remote socket addresses into fixed 50-byte stack buffers with "%pISpc". That is too small for the longest current-tree IPv6-with-po…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31629 - nfc: llcp: add missing return after LLCP_CLOSED checks

In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: add missing return after LLCP_CLOSED checks In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock() and nfc_llcp_sock_put() but fails to return. E…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31628 - x86/CPU: Fix FPDSS on Zen1

In the Linux kernel, the following vulnerability has been resolved: x86/CPU: Fix FPDSS on Zen1 Zen1's hardware divider can leave, under certain circumstances, partial results from previous operations. Those results can be leaked by another, attacker thread. Fix that with a chicken bit.

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31627 - i2c: s3c24xx: check the size of the SMBUS message before using it

In the Linux kernel, the following vulnerability has been resolved: i2c: s3c24xx: check the size of the SMBUS message before using it The first byte of an i2c SMBUS message is the size, and it should be verified to ensure that it is in the range of 0..I2C_SMBUS_BLOCK_MAX before processing it. Th…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31626 - staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using uninitialized data. Smatch warns that only 6 bytes are copied to this 8-byte (u64) variable, leaving th…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31625 - HID: alps: fix NULL pointer dereference in alps_raw_event()

In the Linux kernel, the following vulnerability has been resolved: HID: alps: fix NULL pointer dereference in alps_raw_event() Commit ecfa6f34492c ("HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them") attempted to fix up the HID drivers that had missed the previous fix that w…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31624 - HID: core: clamp report_size in s32ton() to avoid undefined shift

In the Linux kernel, the following vulnerability has been resolved: HID: core: clamp report_size in s32ton() to avoid undefined shift s32ton() shifts by n-1 where n is the field's report_size, a value that comes directly from a HID device. The HID parser bounds report_size only to <= 256, so a b…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31623 - net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()

In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() A malicious USB device claiming to be a CDC Phonet modem can overflow the skb_shared_info->frags[] array by sending an unbounded sequence of full-page bulk transfers…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.
Total resulsts: 348147
Page 173 of 34,815
Β« previous page Β» next page
Filters