8.8

CVSS3.1

CVE-2025-70887 -

An issue in ralphje Signify before v.0.9.2 allows a remote attacker to escalate privileges via the signed_data.py and the context.py components

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 2, 2026, 7:59 a.m.

5.5

CVSS3.1

CVE-2026-23329 - libie: don't unroll if fwlog isn't supported

In the Linux kernel, the following vulnerability has been resolved: libie: don't unroll if fwlog isn't supported The libie_fwlog_deinit() function can be called during driver unload even when firmware logging was never properly initialized. This led to call trace: [ 148.576156] Oops: Oops: 0000…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 23, 2026, 9:10 p.m.

5.5

CVSS3.1

CVE-2026-23374 - blktrace: fix __this_cpu_read/write in preemptible context

In the Linux kernel, the following vulnerability has been resolved: blktrace: fix __this_cpu_read/write in preemptible context tracing_record_cmdline() internally uses __this_cpu_read() and __this_cpu_write() on the per-CPU variable trace_cmdline_save, and trace_save_cmdline() explicitly asserts …

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 4:32 p.m.

5.5

CVSS3.1

CVE-2026-23370 - platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data set_new_password() hex dumps the entire buffer, which contains plaintext password data, including current and new passwords. Remove the hex dump to avoid leaki…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 4:37 p.m.

7.8

CVSS3.1

CVE-2026-23350 - drm/xe/queue: Call fini on exec queue creation fail

In the Linux kernel, the following vulnerability has been resolved: drm/xe/queue: Call fini on exec queue creation fail Every call to queue init should have a corresponding fini call. Skipping this would mean skipping removal of the queue from GuC list (which is part of guc_id allocation). A dama…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 6:05 p.m.

5.5

CVSS3.1

CVE-2026-23346 - arm64: io: Extract user memory type in ioremap_prot()

In the Linux kernel, the following vulnerability has been resolved: arm64: io: Extract user memory type in ioremap_prot() The only caller of ioremap_prot() outside of the generic ioremap() implementation is generic_access_phys(), which passes a 'pgprot_t' value determined from the user mapping of…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 6:15 p.m.

5.5

CVSS3.1

CVE-2026-23345 - arm64: gcs: Do not set PTE_SHARED on GCS mappings if FEAT_LPA2 is enabled

In the Linux kernel, the following vulnerability has been resolved: arm64: gcs: Do not set PTE_SHARED on GCS mappings if FEAT_LPA2 is enabled When FEAT_LPA2 is enabled, bits 8-9 of the PTE replace the shareability attribute with bits 50-51 of the output address. The _PAGE_GCS{,_RO} definitions in…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 6:17 p.m.

7.8

CVSS3.1

CVE-2026-23344 - crypto: ccp - Fix use-after-free on error path

In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Fix use-after-free on error path In the error path of sev_tsm_init_locked(), the code dereferences 't' after it has been freed with kfree(). The pr_err() statement attempts to access t->tio_en and t->tio_init_done a…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 6:17 p.m.

7.8

CVSS3.1

CVE-2026-23359 - bpf: Fix stack-out-of-bounds write in devmap

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stack-out-of-bounds write in devmap get_upper_ifindexes() iterates over all upper devices and writes their indices into an array without checking bounds. Also the callers assume that the max number of upper devices is M…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 7:02 p.m.

5.5

CVSS3.1

CVE-2026-23358 - drm/amdgpu: Fix error handling in slot reset

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix error handling in slot reset If the device has not recovered after slot reset is called, it goes to out label for error handling. There it could make decision based on uninitialized hive pointer and could result i…

πŸ“… Published: March 25, 2026, midnight πŸ”„ Last Modified: April 24, 2026, 7:03 p.m.
Total resulsts: 349182
Page 926 of 34,919
Β« previous page Β» next page
Filters