CVE-2026-23458
- EPSS 0.02%
- Veröffentlicht 03.04.2026 15:15:39
- Zuletzt bearbeitet 27.04.2026 14:16:34
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() ctnetlink_dump_exp_ct() stores a conntrack pointer in cb->data for the netlink dump callback ctnetlink_exp_ct_du...
CVE-2026-23457
- EPSS 0.07%
- Veröffentlicht 03.04.2026 15:15:38
- Zuletzt bearbeitet 27.04.2026 14:16:34
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned l...
CVE-2026-23456
- EPSS 0.07%
- Veröffentlicht 03.04.2026 15:15:37
- Zuletzt bearbeitet 27.04.2026 14:16:34
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) witho...
- EPSS 0.04%
- Veröffentlicht 03.04.2026 15:15:36
- Zuletzt bearbeitet 18.04.2026 09:16:27
In the Linux kernel, the following vulnerability has been resolved: net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown A potential race condition exists in mana_hwc_destroy_channel() where hwc->caller_ctx is freed be...
CVE-2026-23455
- EPSS 0.08%
- Veröffentlicht 03.04.2026 15:15:36
- Zuletzt bearbeitet 27.04.2026 14:16:33
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() In DecodeQ931(), the UserUserIE code path reads a 16-bit length from the packet, then decrements it by 1 to skip...
- EPSS 0.04%
- Veröffentlicht 03.04.2026 15:15:34
- Zuletzt bearbeitet 18.04.2026 09:16:27
In the Linux kernel, the following vulnerability has been resolved: PM: runtime: Fix a race condition related to device removal The following code in pm_runtime_work() may dereference the dev->parent pointer after the parent device has been freed: ...
CVE-2026-23450
- EPSS 0.08%
- Veröffentlicht 03.04.2026 15:15:33
- Zuletzt bearbeitet 27.04.2026 14:16:33
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock() Syzkaller reported a panic in smc_tcp_syn_recv_sock() [1]. smc_tcp_syn_recv_sock() is called in the TCP receive pa...
CVE-2026-23449
- EPSS 0.02%
- Veröffentlicht 03.04.2026 15:15:32
- Zuletzt bearbeitet 27.04.2026 14:16:33
In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: Fix double-free in teql_master_xmit Whenever a TEQL devices has a lockless Qdisc as root, qdisc_reset should be called using the seq_lock to avoid racing with the ...
- EPSS 0.03%
- Veröffentlicht 03.04.2026 15:15:31
- Zuletzt bearbeitet 07.04.2026 13:21:09
In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE entries fit within the skb. The first check corre...
CVE-2026-23447
- EPSS 0.02%
- Veröffentlicht 03.04.2026 15:15:30
- Zuletzt bearbeitet 23.04.2026 20:56:17
In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check The same bounds-check bug fixed for NDP16 in the previous patch also exists in cdc_ncm_rx_verify_ndp32(). The DPE arr...