- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:49
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: tipc: fix divide-by-zero in tipc_sk_filter_connect() A user can set conn_timeout to any value via setsockopt(TIPC_CONN_TIMEOUT), including values less than 4. When a SYN is reject...
- EPSS 0.02%
- Veröffentlicht 08.05.2026 14:21:48
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: kprobes: avoid crash when rmmod/insmod after ftrace killed After we hit ftrace is killed by some errors, the kernel crash if we remove modules in which kprobe probes. BUG: unable ...
CVE-2026-43408
- EPSS 0.01%
- Veröffentlicht 08.05.2026 14:21:47
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: ceph: add a bunch of missing ceph_path_info initializers ceph_mdsc_build_path() must be called with a zero-initialized ceph_path_info parameter, or else the following ceph_mdsc_fre...
CVE-2026-43407
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:46
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() This patch fixes an out-of-bounds access in ceph_handle_auth_reply() that can be triggered by a message of t...
CVE-2026-43406
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:46
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up b...
CVE-2026-43405
- EPSS 0.07%
- Veröffentlicht 08.05.2026 14:21:45
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: libceph: Use u32 for non-negative values in ceph_monmap_decode() This patch fixes unnecessary implicit conversions that change signedness of blob_len and num_mon in ceph_monmap_dec...
CVE-2026-43403
- EPSS 0.01%
- Veröffentlicht 08.05.2026 14:21:44
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: nsfs: tighten permission checks for ns iteration ioctls Even privileged services should not necessarily be able to see other privileged service's namespaces so they can't leak info...
- EPSS 0.02%
- Veröffentlicht 08.05.2026 14:21:42
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in signal ioctl Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited. So check these input valu...
- EPSS 0.02%
- Veröffentlicht 08.05.2026 14:21:40
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in wait ioctl Huge input values in amdgpu_userq_wait_ioctl can lead to a OOM and could be exploited. So check these input value ag...
- EPSS 0.02%
- Veröffentlicht 08.05.2026 14:21:40
- Zuletzt bearbeitet 12.05.2026 14:10:27
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: samsung-dsim: Fix memory leak in error path In samsung_dsim_host_attach(), drm_bridge_add() is called to add the bridge. However, if samsung_dsim_register_te_irq() or p...