| Vendor | Product | Version Range | Status |
|---|---|---|---|
| Linux | Linux | 95118dd4edfec950898a00180c6f998df0a6406d< 59eecf0ffde15670e6a5e10c47be67f73d843b20 | affected |
95118dd4edfec950898a00180c6f998df0a6406d< 5fb69e1eeea9d6cba80517e9f058b56b34bc3a81 | affected | ||
95118dd4edfec950898a00180c6f998df0a6406d< 7cadb03be37e761130edb153544fe0770a842b19 | affected | ||
95118dd4edfec950898a00180c6f998df0a6406d< 1d0bdbfe3e91c11f0a704c52443a9446a10d699c | affected | ||
95118dd4edfec950898a00180c6f998df0a6406d< ea3cd36d7382d5f8309df04c275d20df139ed42c | affected | ||
95118dd4edfec950898a00180c6f998df0a6406d< b255531b27da336571411248c2a72a350662bd09 | affected | ||
5.17 | affected | ||
< 5.17 | unaffected | ||
| … +6 more rows | |||
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-43038 | 9.8 CRITICAL | ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() |
| CVE-2026-43011 | 9.8 CRITICAL | net/x25: Fix potential double free of skb |
| CVE-2026-43039 | 9.8 CRITICAL | net: ti: icssg-prueth: fix missing data copy and wrong recycle in ZC RX dispatch |
| CVE-2026-31705 | 9.8 CRITICAL | ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment |
| CVE-2026-43037 | 9.8 CRITICAL | ip6_tunnel: clear skb2->cb[] in ip4ip6_err() |
| CVE-2026-31718 | 9.8 CRITICAL | ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger |
| CVE-2026-43048 | 8.8 HIGH | HID: core: Mitigate potential OOB by removing bogus memset() |
| CVE-2026-31739 | 8.8 HIGH | crypto: tegra - Add missing CRYPTO_ALG_ASYNC |
| CVE-2026-31735 | 8.8 HIGH | iommupt: Fix short gather if the unmap goes into a large mapping |
| CVE-2026-31717 | 8.8 HIGH | ksmbd: validate owner of durable handle on reconnect |
| CVE-2026-31773 | 8.8 HIGH | Bluetooth: SMP: derive legacy responder STK authentication from MITM state |
| CVE-2026-31709 | 8.8 HIGH | smb: client: validate the whole DACL before rewriting it in cifsacl |
| CVE-2026-31706 | 8.8 HIGH | ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl() |
| CVE-2026-31712 | 8.3 HIGH | ksmbd: require minimum ACE size in smb_check_perm_dacl() |
| CVE-2026-31708 | 8.1 HIGH | smb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path |
| CVE-2026-31779 | 8.1 HIGH | wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() |
| CVE-2026-43051 | 8.1 HIGH | HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq |
| CVE-2026-31771 | 8.1 HIGH | Bluetooth: hci_event: move wake reason storage into validated event handlers |
| CVE-2026-43019 | 7.8 HIGH | Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync |
| CVE-2026-31772 | 7.8 HIGH | Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync |
Showing top 20 of 146 CVEs. View all on vendor page → →
No comments yet