- EPSS 0.04%
- Published 19.08.2025 17:15:31
- Last modified 09.09.2025 17:15:45
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit...
- EPSS 0.03%
- Published 19.08.2025 17:15:31
- Last modified 20.08.2025 14:40:17
In the Linux kernel, the following vulnerability has been resolved: HID: apple: validate feature-report field count to prevent NULL pointer dereference A malicious HID device with quirk APPLE_MAGIC_BACKLIGHT can trigger a NULL pointer dereference w...
- EPSS 0.05%
- Published 19.08.2025 06:15:33
- Last modified 28.08.2025 15:15:52
In the Linux kernel, the following vulnerability has been resolved: net/sched: Restrict conditions for adding duplicating netems to qdisc tree netem_enqueue's duplication prevention logic breaks when a netem resides in a qdisc tree with other netem...
- EPSS 0.6%
- Published 16.08.2025 13:29:51
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read in smb2_sess_setup ksmbd does not consider the case of that smb2 session setup is in compound request. If this is the second payload of the compound, ...
- EPSS 0.03%
- Published 16.08.2025 13:27:58
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea() There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request from client. ksmbd find next smb2_...
- EPSS 0.04%
- Published 16.08.2025 13:27:57
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in the compound request This patch validate session id and tree id in compound request. If first operation in the compound is SMB2 ECHO reque...
- EPSS 0.04%
- Published 16.08.2025 13:27:56
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out-of-bound read in smb2_write ksmbd_smb2_check_message doesn't validate hdr->NextCommand. If ->NextCommand is bigger than Offset + Length of smb2 write, It will allow ...
- EPSS 0.03%
- Published 16.08.2025 13:25:50
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate command request size In commit 2b9b8f3b68ed ("ksmbd: validate command payload size"), except for SMB2_OPLOCK_BREAK_HE command, the request size of other commands is...
- EPSS 0.08%
- Published 16.08.2025 13:25:49
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.
- EPSS 0.14%
- Published 16.08.2025 13:22:09
- Last modified 18.08.2025 20:16:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: call rcu_barrier() in ksmbd_server_exit() racy issue is triggered the bug by racing between closing a connection and rmmod. In ksmbd, rcu_barrier() is not called at module u...