0.0

CVE-2026-31622 - NFC: digital: Bounds check NFC-A cascade depth in SDD response handler

In the Linux kernel, the following vulnerability has been resolved: NFC: digital: Bounds check NFC-A cascade depth in SDD response handler The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3 or 4 bytes to target->nfcid1 on each round, but the number of cascade rounds is contro…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31621 - bnge: return after auxiliary_device_uninit() in error path

In the Linux kernel, the following vulnerability has been resolved: bnge: return after auxiliary_device_uninit() in error path When auxiliary_device_add() fails, the error block calls auxiliary_device_uninit() but does not return. The uninit drops the last reference and synchronously runs bnge_a…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31620 - ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0

In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 A malicious USB device with the TASCAM US-144MKII device id can have a configuration containing bInterfaceNumber=1 but no interface 0. USB configuration descriptors a…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31619 - ALSA: fireworks: bound device-supplied status before string array lookup

In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] has 17 entries so a status value outside that ran…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31618 - fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO

In the Linux kernel, the following vulnerability has been resolved: fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO Much like commit 19f953e74356 ("fbdev: fb_pm2fb: Avoid potential divide by zero error"), we also need to prevent that same crash from happening in the udlfb driver as it …

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31617 - usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When block_len is smaller than opts->ndp_size, the bounds …

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31616 - usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet function by sending an unbounded sequence of ful…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31615 - usb: gadget: renesas_usb3: validate endpoint index in standard request handlers

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIndex without any sort of validation. Fix this up b…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31614 - smb: client: fix off-by-8 bounds check in check_wsl_eas()

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(struct smb2_file_full_ea_info) = 8 from ea, not at …

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31613 - smb: client: fix OOB reads parsing symlink error response

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leaving the symlink parsers as the only defense agains…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.
Total resulsts: 348769
Page 236 of 34,877
Β« previous page Β» next page
Filters