CVE-2026-31707
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:20
- Zuletzt bearbeitet 06.05.2026 20:26:38
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate response sizes in ipc_validate_msg() ipc_validate_msg() computes the expected message size for each response type by adding (or multiplying) attacker-controlled fie...
CVE-2026-31708
- EPSS 0.04%
- Veröffentlicht 01.05.2026 14:16:20
- Zuletzt bearbeitet 06.05.2026 20:25:14
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path smb2_ioctl_query_info() has two response-copy branches: PASSTHRU_FSCTL and the default QUERY_INFO path. The QUER...
CVE-2026-31709
- EPSS 0.04%
- Veröffentlicht 01.05.2026 14:16:20
- Zuletzt bearbeitet 07.05.2026 06:16:03
In the Linux kernel, the following vulnerability has been resolved: smb: client: validate the whole DACL before rewriting it in cifsacl build_sec_desc() and id_mode_to_cifs_acl() derive a DACL pointer from a server-supplied dacloffset and then use ...
CVE-2026-31694
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:23:22
In the Linux kernel, the following vulnerability has been resolved: fuse: reject oversized dirents in page cache fuse_add_dirent_to_cache() computes a serialized dirent size from the server-controlled namelen field and copies the dirent into a sing...
CVE-2026-31695
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:19:51
In the Linux kernel, the following vulnerability has been resolved: wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free Currently we execute `SET_NETDEV_DEV(dev, &priv->lowerdev->dev)` for the virt_wifi net devices. However, unregisterin...
CVE-2026-31696
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:17:41
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix missing validation of ticket length in non-XDR key preparsing In rxrpc_preparse(), there are two paths for parsing key payloads: the XDR path (for large payloads) and th...
CVE-2026-31697
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:08:18
In the Linux kernel, the following vulnerability has been resolved: crypto: ccp: Don't attempt to copy ID to userspace if PSP command failed When retrieving the ID for the CPU, don't attempt to copy the ID blob to userspace if the firmware command ...
CVE-2026-31698
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:06:34
In the Linux kernel, the following vulnerability has been resolved: crypto: ccp: Don't attempt to copy PDH cert to userspace if PSP command failed When retrieving the PDH cert, don't attempt to copy the blobs to userspace if the firmware command fa...
CVE-2026-31699
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:04:51
In the Linux kernel, the following vulnerability has been resolved: crypto: ccp: Don't attempt to copy CSR to userspace if PSP command failed When retrieving the PEK CSR, don't attempt to copy the blob to userspace if the firmware command failed. ...
CVE-2026-31700
- EPSS 0.01%
- Veröffentlicht 01.05.2026 14:16:19
- Zuletzt bearbeitet 06.05.2026 19:01:07
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix TOCTOU race on mmap'd vnet_hdr in tpacket_snd() In tpacket_snd(), when PACKET_VNET_HDR is enabled, vnet_hdr points directly into the mmap'd TX ring buffer shared wi...