CVE-2026-43407
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:46
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() This patch fixes an out-of-bounds access in ceph_handle_auth_reply() that can be triggered by a message of t...
CVE-2026-43406
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:46
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up b...
CVE-2026-43405
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:45
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: libceph: Use u32 for non-negative values in ceph_monmap_decode() This patch fixes unnecessary implicit conversions that change signedness of blob_len and num_mon in ceph_monmap_dec...
- EPSS 0.02%
- Veröffentlicht 08.05.2026 14:21:42
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in signal ioctl Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited. So check these input valu...
- EPSS 0.02%
- Veröffentlicht 08.05.2026 14:21:40
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in wait ioctl Huge input values in amdgpu_userq_wait_ioctl can lead to a OOM and could be exploited. So check these input value ag...
- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:33
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() Just like in commit 154828bf9559 ("staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser"), we don't t...
- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:32
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie The current code checks 'i + 5 < in_len' at the end of the if statement. However, it accesses 'in_ie[i +...
CVE-2026-43383
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:30
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: net/tcp-md5: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:30
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid double-rtnl_lock ELP metric worker batadv_v_elp_get_throughput() might be called when the RTNL lock is already held. This could be problematic when the work queue...
- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:29
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: nouveau/dpcd: return EBUSY for aux xfer if the device is asleep If we have runtime suspended, and userspace wants to use /dev/drm_dp_* then just tell it the device is busy instead ...