5.5

CVSS3.1

CVE-2026-23368 - net: phy: register phy led_triggers during probe to avoid AB-BA deadlock

In the Linux kernel, the following vulnerability has been resolved: net: phy: register phy led_triggers during probe to avoid AB-BA deadlock There is an AB-BA deadlock when both LEDS_TRIGGER_NETDEV and LED_TRIGGER_PHY are enabled: [ 1362.049207] [<8054e4b8>] led_trigger_register+0x5c/0x1fc …

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 6:41 p.m.

7.4

CVSS3.1

CVE-2026-23364 - ksmbd: Compare MACs in constant time

In the Linux kernel, the following vulnerability has been resolved: ksmbd: Compare MACs in constant time To prevent timing attacks, MAC comparisons need to be constant-time. Replace the memcmp() with the correct function, crypto_memneq().

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 3:46 p.m.

5.5

CVSS3.1

CVE-2026-23377 - ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz

In the Linux kernel, the following vulnerability has been resolved: ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz The only user of frag_size field in XDP RxQ info is bpf_xdp_frags_increase_tail(). It clearly expects whole buff size instead of DMA write size. Different assump…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 4:23 p.m.

4.7

CVSS3.1

CVE-2026-23394 - af_unix: Give up GC if MSG_PEEK intervened.

In the Linux kernel, the following vulnerability has been resolved: af_unix: Give up GC if MSG_PEEK intervened. Igor Ushakov reported that GC purged the receive queue of an alive socket due to a race with MSG_PEEK with a nice repro. This is the exact same issue previously fixed by commit cbcf011…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 3:20 p.m.

9.8

CVSS3.1

CVE-2025-59707 - Remote Code Execution via Spoofing in N2W before 4.3.2

In N2W before 4.3.2 and 4.4.x before 4.4.1, there is potential remote code execution and account credentials theft because of a spoofing vulnerability.

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 25, 2026, 6:01 p.m.

9.8

CVSS3.1

CVE-2026-26831 -

textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequa…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: March 30, 2026, 8:58 p.m.

5.5

CVSS3.1

CVE-2026-23360 - nvme: fix admin queue leak on controller reset

In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin queue leak on controller reset When nvme_alloc_admin_tag_set() is called during a controller reset, a previous admin queue may still exist. Release it properly before allocating a new one to avoid orphaning the ol…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 6:59 p.m.

0.0

CVE-2026-23305 - accel/rocket: fix unwinding in error path in rocket_probe

In the Linux kernel, the following vulnerability has been resolved: accel/rocket: fix unwinding in error path in rocket_probe When rocket_core_init() fails (as could be the case with EPROBE_DEFER), we need to properly unwind by decrementing the counter we just incremented and if this is the first…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 13, 2026, 6:04 a.m.

0.0

CVE-2026-23285 - drbd: fix null-pointer dereference on local read error

In the Linux kernel, the following vulnerability has been resolved: drbd: fix null-pointer dereference on local read error In drbd_request_endio(), READ_COMPLETED_WITH_ERROR is passed to __req_mod() with a NULL peer_device: __req_mod(req, what, NULL, &m); The READ_COMPLETED_WITH_ERROR handler…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 13, 2026, 6:03 a.m.

5.5

CVSS3.1

CVE-2026-23316 - net: ipv4: fix ARM64 alignment fault in multipath hash seed

In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix ARM64 alignment fault in multipath hash seed `struct sysctl_fib_multipath_hash_seed` contains two u32 fields (user_seed and mp_seed), making it an 8-byte structure with a 4-byte alignment requirement. In `fib_mult…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 23, 2026, 9:07 p.m.
Total resulsts: 349182
Page 925 of 34,919
Β« previous page Β» next page
Filters