Filter and search through 392,438 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-22997 | In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon recei... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-22996 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv mlx5e_priv is an uns... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22995 | In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists bet... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22994 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22993 | In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr issue after soft reset During soft reset, the RSS LUT... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22992 | In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any erro... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22991 | In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose_... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22990 | In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22989 | In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is running in unlock_filesystem If we are trying to unlo... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22988 | In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is t... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22987 | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy syzbot re... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22986 | In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for gdev->srcu If two drivers were calling gpiochip_... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22985 | In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations The RSS LUT is ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22984 | In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22983 | In the Linux kernel, the following vulnerability has been resolved: net: do not write to msg_get_inq in callee NULL pointer dereference fix. msg_ge... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22982 | In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash when adding interface under a lag Commit 15faa1f67a... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22981 | In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset Protect the reset path fro... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22980 | In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with ser... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22979 | In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_segment_list for GRO packets When skb_segment_list()... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22978 | In the Linux kernel, the following vulnerability has been resolved: wifi: avoid kernel-infoleak from struct iw_point struct iw_point has a 32bit hol... | 0.0 | 0 | Neutral | No | Yes |