0.0

CVE-2026-31639 - rxrpc: Fix key reference count leak from call->key

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key reference count leak from call->key When creating a client call in rxrpc_alloc_client_call(), the code obtains a reference to the key. This is never cleaned up and gets leaked when the call is destroyed. Fix this…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31638 - rxrpc: Only put the call ref if one was acquired

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Only put the call ref if one was acquired rxrpc_input_packet_on_conn() can process a to-client packet after the current client call on the channel has already been torn down. In that case chan->call is NULL, rxrpc_try_get…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31637 - rxrpc: reject undecryptable rxkad response tickets

In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto_skcipher_decrypt() succeeded. A malformed RESPO…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31636 - rxrpc: fix RESPONSE authenticator parser OOB read

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix RESPONSE authenticator parser OOB read rxgk_verify_authenticator() copies auth_len bytes into a temporary buffer and then passes p + auth_len as the parser limit to rxgk_do_verify_authenticator(). Since p is a __be32 *…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31635 - rxrpc: fix oversized RESPONSE authenticator length check

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix oversized RESPONSE authenticator length check rxgk_verify_response() decodes auth_len from the packet and is supposed to verify that it fits in the remaining bytes. The existing check is inverted, so oversized RESPONSE…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31634 - rxrpc: fix reference count leak in rxrpc_server_keyring()

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix reference count leak in rxrpc_server_keyring() This patch fixes a reference count leak in rxrpc_server_keyring() by checking if rx->securities is already set.

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31633 - rxrpc: Fix integer overflow in rxgk_verify_response()

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix integer overflow in rxgk_verify_response() In rxgk_verify_response(), there's a potential integer overflow due to rounding up token_len before checking it, thereby allowing the length check to be bypassed. Fix this by…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31632 - rxrpc: Fix leak of rxgk context in rxgk_verify_response()

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix leak of rxgk context in rxgk_verify_response() Fix rxgk_verify_response() to clean up the rxgk context it creates.

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31631 - rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() Fix rxgk_do_verify_authenticator() to check the buffer size before checking the nonce.

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31630 - rxrpc: proc: size address buffers for %pISpc output

In the Linux kernel, the following vulnerability has been resolved: rxrpc: proc: size address buffers for %pISpc output The AF_RXRPC procfs helpers format local and remote socket addresses into fixed 50-byte stack buffers with "%pISpc". That is too small for the longest current-tree IPv6-with-po…

πŸ“… Published: April 24, 2026, 2:44 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.
Total resulsts: 348736
Page 231 of 34,874
Β« previous page Β» next page
Filters