CVE-2026-31622
- EPSS 0.03%
- Veröffentlicht 24.04.2026 14:42:39
- Zuletzt bearbeitet 28.04.2026 14:14:07
In the Linux kernel, the following vulnerability has been resolved: NFC: digital: Bounds check NFC-A cascade depth in SDD response handler The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3 or 4 bytes to target->nfcid1 on each ...
CVE-2026-31618
- EPSS 0.02%
- Veröffentlicht 24.04.2026 14:42:37
- Zuletzt bearbeitet 28.04.2026 14:07:04
In the Linux kernel, the following vulnerability has been resolved: fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO Much like commit 19f953e74356 ("fbdev: fb_pm2fb: Avoid potential divide by zero error"), we also need to prevent that sam...
CVE-2026-31619
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:37
- Zuletzt bearbeitet 28.04.2026 14:09:16
In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] ...
CVE-2026-31617
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:36
- Zuletzt bearbeitet 28.04.2026 17:27:20
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When bloc...
CVE-2026-31616
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:35
- Zuletzt bearbeitet 28.04.2026 17:21:15
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet...
CVE-2026-31615
- EPSS 0.02%
- Veröffentlicht 24.04.2026 14:42:34
- Zuletzt bearbeitet 28.04.2026 17:29:26
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIn...
CVE-2026-31613
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:42:33
- Zuletzt bearbeitet 28.04.2026 15:13:18
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leavi...
CVE-2026-31611
- EPSS 0.07%
- Veröffentlicht 24.04.2026 14:42:32
- Zuletzt bearbeitet 29.04.2026 16:56:48
In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If si...
CVE-2026-31612
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:42:32
- Zuletzt bearbeitet 29.04.2026 17:00:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without ...
CVE-2026-31610
- EPSS 0.02%
- Veröffentlicht 24.04.2026 14:42:31
- Zuletzt bearbeitet 29.04.2026 16:51:02
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_neg...