- EPSS 0.04%
- Veröffentlicht 13.04.2026 13:40:27
- Zuletzt bearbeitet 18.04.2026 09:16:32
In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP Weiming Shi says: xt_match and xt_target structs registered with NFPROTO_UNSPEC can be load...
- EPSS 0.04%
- Veröffentlicht 13.04.2026 13:40:26
- Zuletzt bearbeitet 18.04.2026 09:16:32
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() m2sm() converts a u32 slope to a u64 scaled value. For large inputs (e.g. m1=4000000000), the result can reach 2^32. rtsc_mi...
- EPSS 0.04%
- Veröffentlicht 13.04.2026 13:40:25
- Zuletzt bearbeitet 18.04.2026 09:16:31
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_fw: fix NULL pointer dereference on shared blocks The old-method path in fw_classify() calls tcf_block_q() and dereferences q->handle. Shared blocks leave block->q ...
- EPSS 0.04%
- Veröffentlicht 13.04.2026 13:40:25
- Zuletzt bearbeitet 18.04.2026 09:16:32
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_flow: fix NULL pointer dereference on shared blocks flow_change() calls tcf_block_q() and dereferences q->handle to derive a default baseclass. Shared blocks leave ...
CVE-2026-31417
- EPSS 0.07%
- Veröffentlicht 13.04.2026 13:21:04
- Zuletzt bearbeitet 27.04.2026 14:16:37
In the Linux kernel, the following vulnerability has been resolved: net/x25: Fix overflow when accumulating packets Add a check to ensure that `x25_sock.fraglen` does not overflow. The `fraglen` also needs to be resetted when purging `fragment_que...
- EPSS 0.04%
- Veröffentlicht 13.04.2026 13:21:03
- Zuletzt bearbeitet 18.04.2026 09:16:31
In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid overflows in ip6_datagram_send_ctl() Yiming Qian reported : <quote> I believe I found a locally triggerable kernel bug in the IPv6 sendmsg ancillary-data path that ca...
- EPSS 0.04%
- Veröffentlicht 13.04.2026 13:21:03
- Zuletzt bearbeitet 18.04.2026 09:16:31
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size...
CVE-2026-31414
- EPSS 0.08%
- Veröffentlicht 13.04.2026 13:21:02
- Zuletzt bearbeitet 27.04.2026 14:16:37
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_expect: use expect->helper Use expect->helper in ctnetlink and /proc to dump the helper name. Using nfct_help() without holding a reference to the master co...
- EPSS 0.02%
- Veröffentlicht 10.04.2026 10:35:05
- Zuletzt bearbeitet 13.04.2026 15:02:06
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() The `check_command_size_in_blocks()` function calculates the data size in bytes by lef...
- EPSS 0.04%
- Veröffentlicht 08.04.2026 13:06:17
- Zuletzt bearbeitet 08.04.2026 21:26:13
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix crash due to unvalidated vcc pointer in sigd_send() Reproducer available at [1]. The ATM send path (sendmsg -> vcc_sendmsg -> sigd_send) reads the vcc pointer from m...