0.0

CVE-2026-31617 - usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When block_len is smaller than opts->ndp_size, the bounds …

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31616 - usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet function by sending an unbounded sequence of ful…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31615 - usb: gadget: renesas_usb3: validate endpoint index in standard request handlers

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIndex without any sort of validation. Fix this up b…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31614 - smb: client: fix off-by-8 bounds check in check_wsl_eas()

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(struct smb2_file_full_ea_info) = 8 from ea, not at …

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31613 - smb: client: fix OOB reads parsing symlink error response

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leaving the symlink parsers as the only defense agains…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31612 - ksmbd: validate EaNameLength in smb2_get_ea()

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without verifying that the length of the name really is t…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31611 - ksmbd: require 3 sub-authorities before reading sub_auth[2]

In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If sid_unix_NFS_mode is the prefix S-1-5-88-3 with num…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31610 - ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_negTokenInit() reaches the mechToken [2] OCTET STRIN…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31609 - smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()

In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.

0.0

CVE-2026-31608 - smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()

In the Linux kernel, the following vulnerability has been resolved: smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to th…

πŸ“… Published: April 24, 2026, 2:42 p.m. πŸ”„ Last Modified: April 24, 2026, 5:51 p.m.
Total resulsts: 348825
Page 242 of 34,883
Β« previous page Β» next page
Filters