CVE-2026-31619
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:37
- Zuletzt bearbeitet 28.04.2026 14:09:16
In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] ...
CVE-2026-31617
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:36
- Zuletzt bearbeitet 28.04.2026 17:27:20
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When bloc...
CVE-2026-31616
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:35
- Zuletzt bearbeitet 28.04.2026 17:21:15
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet...
CVE-2026-31614
- EPSS 0.01%
- Veröffentlicht 24.04.2026 14:42:34
- Zuletzt bearbeitet 29.04.2026 18:03:40
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(st...
CVE-2026-31615
- EPSS 0.02%
- Veröffentlicht 24.04.2026 14:42:34
- Zuletzt bearbeitet 28.04.2026 17:29:26
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIn...
CVE-2026-31613
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:42:33
- Zuletzt bearbeitet 28.04.2026 15:13:18
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leavi...
CVE-2026-31611
- EPSS 0.07%
- Veröffentlicht 24.04.2026 14:42:32
- Zuletzt bearbeitet 29.04.2026 16:56:48
In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If si...
CVE-2026-31612
- EPSS 0.05%
- Veröffentlicht 24.04.2026 14:42:32
- Zuletzt bearbeitet 29.04.2026 17:00:28
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without ...
CVE-2026-31610
- EPSS 0.02%
- Veröffentlicht 24.04.2026 14:42:31
- Zuletzt bearbeitet 29.04.2026 16:51:02
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_neg...
CVE-2026-31607
- EPSS 0.07%
- Veröffentlicht 24.04.2026 14:42:29
- Zuletzt bearbeitet 28.04.2026 15:11:28
In the Linux kernel, the following vulnerability has been resolved: usbip: validate number_of_packets in usbip_pack_ret_submit() When a USB/IP client receives a RET_SUBMIT response, usbip_pack_ret_submit() unconditionally overwrites urb->number_of_...