CVE-2026-23228 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()

Information published.


CVE-2026-23222 crypto: omap – Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly

Information published.


CVE-2026-23212 bonding: annotate data-races around slave->last_rx

Information published.


CVE-2026-23216 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()

Information published.


CVE-2025-68725 bpf: Do not let BPF test infra emit invalid GSO types to stack

Information published.


CVE-2025-68223 drm/radeon: delete radeon_fence_process in is_signaled, no deadlock

Information published.


CVE-2025-40164 usbnet: Fix using smp_processor_id() in preemptible code warnings

Information published.


CVE-2025-40005 spi: cadence-quadspi: Implement refcount to handle unbind during busy

Information published.


CVE-2025-38162 netfilter: nft_set_pipapo: prevent overflow in lookup table allocation

Information published.


CVE-2026-28364 In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

Information published.


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

AbuseIPDB Contributor Badge