CVE-2026-31637
- EPSS 0.08%
- Veröffentlicht 24.04.2026 14:44:51
- Zuletzt bearbeitet 27.04.2026 20:20:48
In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto...
CVE-2026-31636
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:44:50
- Zuletzt bearbeitet 27.04.2026 20:21:04
In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix RESPONSE authenticator parser OOB read rxgk_verify_authenticator() copies auth_len bytes into a temporary buffer and then passes p + auth_len as the parser limit to rxgk...
CVE-2026-31634
- EPSS 0.02%
- Veröffentlicht 24.04.2026 14:44:49
- Zuletzt bearbeitet 27.04.2026 20:30:25
In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix reference count leak in rxrpc_server_keyring() This patch fixes a reference count leak in rxrpc_server_keyring() by checking if rx->securities is already set.
CVE-2026-31635
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:44:49
- Zuletzt bearbeitet 27.04.2026 20:30:19
In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix oversized RESPONSE authenticator length check rxgk_verify_response() decodes auth_len from the packet and is supposed to verify that it fits in the remaining bytes. The ...
CVE-2026-31633
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:44:48
- Zuletzt bearbeitet 27.04.2026 20:30:33
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix integer overflow in rxgk_verify_response() In rxgk_verify_response(), there's a potential integer overflow due to rounding up token_len before checking it, thereby allow...
CVE-2026-31631
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:44:47
- Zuletzt bearbeitet 27.04.2026 20:30:46
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() Fix rxgk_do_verify_authenticator() to check the buffer size before checking the nonce.
CVE-2026-31632
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:44:47
- Zuletzt bearbeitet 27.04.2026 20:30:38
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix leak of rxgk context in rxgk_verify_response() Fix rxgk_verify_response() to clean up the rxgk context it creates.
CVE-2026-31630
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:44:46
- Zuletzt bearbeitet 27.04.2026 20:30:55
In the Linux kernel, the following vulnerability has been resolved: rxrpc: proc: size address buffers for %pISpc output The AF_RXRPC procfs helpers format local and remote socket addresses into fixed 50-byte stack buffers with "%pISpc". That is to...
CVE-2026-31628
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:49
- Zuletzt bearbeitet 27.04.2026 20:40:46
In the Linux kernel, the following vulnerability has been resolved: x86/CPU: Fix FPDSS on Zen1 Zen1's hardware divider can leave, under certain circumstances, partial results from previous operations. Those results can be leaked by another, attack...
CVE-2026-31629
- EPSS 0.03%
- Veröffentlicht 24.04.2026 14:42:49
- Zuletzt bearbeitet 27.04.2026 20:36:33
In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: add missing return after LLCP_CLOSED checks In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock...