Total CVEs

126,186

Critical Severity

2,292

High Severity

7,951

Last 7 Days

1,205
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 1,341 - 1,360 of 22,591 CVEs
CVE-2026-31653 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails damon_call() for repeat_call_control of DAMON_SYSFS could fail if somehow the kdamond is stopped before the damon_call(). It could happen, for example, when te dam...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31652 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: mm/damon/stat: deallocate damon_call() failure leaking damon_ctx damon_stat_start() always allocates the module's damon_ctx object (damon_stat_context). Meanwhile, if damon_call() in the function fails, the damon_ctx object ...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31651 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix NULL-deref on disconnect Make sure to deregister the controller before dropping the reference to the driver data on disconnect to avoid NULL-pointer dereferences or use-after-free.

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31650 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix use-after-free on disconnect The vub300 driver maintains an explicit reference count for the controller and its driver data and the last reference can in theory be dropped after the driver has been unbound. This ...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31649 CRITICAL - 9.8

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix integer underflow in chain mode The jumbo_frm() chain-mode implementation unconditionally computes len = nopaged_len - bmax; where nopaged_len = skb_headlen(skb) (linear bytes only) and bmax is BUF_SIZE_8KiB...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31648 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I encountered some very strange crash issues showing up as "Bad page state": " ...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31647 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling Switch from using the completion's raw spinlock to a local lock in the idpf_vc_xn struct. The conversion is safe because complete/_all() are called outside th...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31646 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() page_pool_create() can return an ERR_PTR on failure. The return value is used unconditionally in the loop that follows, passing the error pointer thro...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31645 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix page pool leak in error paths lan966x_fdma_rx_alloc() creates a page pool but does not destroy it if the subsequent fdma_alloc_coherent() call fails, leaking the pool. Similarly, lan966x_fdma_init() frees the co...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31644 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix use-after-free and leak in lan966x_fdma_reload() When lan966x_fdma_reload() fails to allocate new RX buffers, the restore path restarts DMA using old descriptors whose pages were already freed via lan966x_fdma_rx...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31643 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key parsing memleak In rxrpc_preparse_xdr_yfs_rxgk(), the memory attached to token->rxgk can be leaked in a few error paths after it's allocated. Fix this by freeing it in the "reject_token:" case.

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31642 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix call removal to use RCU safe deletion Fix rxrpc call removal from the rxnet->calls list to use list_del_rcu() rather than list_del_init() to prevent stuffing up reading /proc/net/rxrpc/calls from potentially getting ...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31641 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix RxGK token loading to check bounds rxrpc_preparse_xdr_yfs_rxgk() reads the raw key length and ticket length from the XDR token as u32 values and passes each through round_up(x, 4) before using the rounded value for vali...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31640 HIGH - 7.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial In rxrpc_post_response(), the code should be comparing the challenge serial number from the cached response before deciding to switch to a newer response, but...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31639 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key reference count leak from call->key When creating a client call in rxrpc_alloc_client_call(), the code obtains a reference to the key. This is never cleaned up and gets leaked when the call is destroyed. Fix th...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31638 HIGH - 7.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Only put the call ref if one was acquired rxrpc_input_packet_on_conn() can process a to-client packet after the current client call on the channel has already been torn down. In that case chan->call is NULL, rxrpc_try_g...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31637 CRITICAL - 9.8

In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto_skcipher_decrypt() succeeded. A malformed RESPON...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31636 CRITICAL - 9.1

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix RESPONSE authenticator parser OOB read rxgk_verify_authenticator() copies auth_len bytes into a temporary buffer and then passes p + auth_len as the parser limit to rxgk_do_verify_authenticator(). Since p is a __be32 *,...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31635 HIGH - 7.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix oversized RESPONSE authenticator length check rxgk_verify_response() decodes auth_len from the packet and is supposed to verify that it fits in the remaining bytes. The existing check is inverted, so oversized RESPONSE ...

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD
CVE-2026-31634 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix reference count leak in rxrpc_server_keyring() This patch fixes a reference count leak in rxrpc_server_keyring() by checking if rx->securities is already set.

Vendor: Linux
Product: Linux
Published: Apr 24, 2026
Source: NVD