Логотип exploitDog
bind:"BDU:2025-14699" OR bind:"CVE-2025-40186"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-14699" OR bind:"CVE-2025-40186"

Количество 38

Количество 38

fstec логотип

BDU:2025-14699

6 месяцев назад

Уязвимость функции reqsk_fastopen_remove() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2025-40186

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib...

EPSS: Низкий
redhat логотип

CVE-2025-40186

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-40186

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate

EPSS: Низкий
debian логотип

CVE-2025-40186

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: t ...

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20294-1

24 дня назад

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20252-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0525-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
github логотип

GHSA-qx52-pj36-489j

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_satur...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0561-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0557-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0551-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0524-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0491-1

около 1 месяца назад

Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0555-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0550-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0521-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0518-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0515-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0490-1

около 1 месяца назад

Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-14699

Уязвимость функции reqsk_fastopen_remove() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2025-40186

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib...

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-40186

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib...

CVSS3: 7
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-40186

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40186

In the Linux kernel, the following vulnerability has been resolved: t ...

0%
Низкий
4 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20294-1

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16)

0%
Низкий
24 дня назад
suse-cvrf логотип
openSUSE-SU-2026:20252-1

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16)

0%
Низкий
около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0525-1

Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5)

0%
Низкий
около 1 месяца назад
github логотип
GHSA-qx52-pj36-489j

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_satur...

0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0561-1

Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0557-1

Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0551-1

Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0524-1

Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0491-1

Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0555-1

Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0550-1

Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0521-1

Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0518-1

Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0515-1

Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0490-1

Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад

Уязвимостей на страницу