Page 4 of 8979 results (0.004 seconds)

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt() can advance past the end of the destination scatterlist and trigger a NULL pointer dereference in scatterwalk_map_and_copy(), leading to a kernel panic (DoS). Add a minimum AAD length check to fail fast on invalid inputs. Several vuln... • https://git.kernel.org/stable/c/104880a6b470958ddc30e139c41aa4f6ed3a5234 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In ems_usb_open(), the URBs for USB-in transfers are allocated, added to the dev->rx_submitted anchor and submitted. In the complete callback ems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In ems_usb_close() the URBs are freed by calling... • https://git.kernel.org/stable/c/702171adeed3607ee9603ec30ce081411e36ae42 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: uacce: implement mremap in uacce_vm_ops to return -EPERM The current uacce_vm_ops does not support the mremap operation of vm_operations_struct. Implement .mremap to return -EPERM to remind users. The reason we need to explicitly disable mremap is that when the driver does not implement .mremap, it uses the default mremap method. This could lead to a risk scenario: An application might first mmap address p1, then mremap to p2, followed by m... • https://git.kernel.org/stable/c/015d239ac0142ad0e26567fd890ef8d171f13709 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver at91_adc_interrupt can call at91_adc_touch_data_handler function to start the work by schedule_work(&st->touch_st.workq). If we remove the module which will call at91_adc_remove to make cleanup, it will free indio_dev through iio_device_unregister but quite a bit later. While the work mentioned above will be used. The sequence of operations that may lead to a UAF... • https://git.kernel.org/stable/c/23ec2774f1cc168b1f32a2e0ed2709cb473bb94e •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection The st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL event_spec field, indicating support for IIO events. However, event detection is not supported for all sensors, and if userspace tries to configure accelerometer wakeup events on a sensor device that does not support them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL pointer when... • https://git.kernel.org/stable/c/b5969abfa8b8ed43ebd93479d394f664bd4a5a87 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: w1: therm: Fix off-by-one buffer overflow in alarms_store The sysfs buffer passed to alarms_store() is allocated with 'size + 1' bytes and a NUL terminator is appended. However, the 'size' argument does not account for this extra byte. The original code then allocated 'size' bytes and used strcpy() to copy 'buf', which always writes one byte past the allocated buffer since strcpy() copies until the NUL terminator at index 'size'. Fix this b... • https://git.kernel.org/stable/c/e2c94d6f572079511945e64537eb1218643f2e68 •

CVSS: -EPSS: 0%CPEs: 5EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: net: hv_netvsc: reject RSS hash key programming without RX indirection table RSS configuration requires a valid RX indirection table. When the device reports a single receive queue, rndis_filter_device_add() does not allocate an indirection table, accepting RSS hash key updates in this state leads to a hang. Fix this by gating netvsc_set_rxfh() on ndc->rx_table_sz and return -EOPNOTSUPP when the table is absent. This aligns set_rxfh with th... • https://git.kernel.org/stable/c/962f3fee83a4ef9010ae84dc43ae7aecb572e2a9 •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix a deadlock when returning a delegation during open() Ben Coddington reports seeing a hang in the following stack trace: 0 [ffffd0b50e1774e0] __schedule at ffffffff9ca05415 1 [ffffd0b50e177548] schedule at ffffffff9ca05717 2 [ffffd0b50e177558] bit_wait at ffffffff9ca061e1 3 [ffffd0b50e177568] __wait_on_bit at ffffffff9ca05cfb 4 [ffffd0b50e1775c8] out_of_line_wait_on_bit at ffffffff9ca05ea5 5 [ffffd0b50e177618] pnfs_roc at ffffffffc... • https://git.kernel.org/stable/c/29ade5db12930ec60133f6a02791f4b1a4af2943 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel The connector type for the DataImage SCF0700C48GGU18 panel is missing and devm_drm_panel_bridge_add() requires connector type to be set. This leads to a warning and a backtrace in the kernel log and panel does not work: " WARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8 " The warning is triggered by a check for valid connec... • https://git.kernel.org/stable/c/97ceb1fb08b6a2f78aa44a7c229ca280964860c0 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=. Several vulnerabilities have been discovered in th... • https://git.kernel.org/stable/c/94c358da3a0545205c6c6a50ae26141f1c73acfa •