Логотип exploitDog
bind:"CVE-2025-39718"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39718"

Количество 16

Количество 16

ubuntu логотип

CVE-2025-39718

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

EPSS: Низкий
redhat логотип

CVE-2025-39718

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-39718

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

EPSS: Низкий
msrc логотип

CVE-2025-39718

около 2 месяцев назад

vsock/virtio: Validate length in packet header before skb_put()

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-39718

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: v ...

EPSS: Низкий
github логотип

GHSA-4whh-7h4c-xh74

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19105

9 дней назад

ELSA-2025-19105: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19106

9 дней назад

ELSA-2025-19106: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20719

13 дней назад

ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3725-1

14 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03601-1

21 день назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03602-1

21 день назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03633-1

19 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3751-1

13 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03600-1

21 день назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03634-1

19 дней назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-39718

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

0%
Низкий
2 месяца назад
redhat логотип
CVE-2025-39718

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

CVSS3: 7.6
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-39718

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

0%
Низкий
2 месяца назад
msrc логотип
CVE-2025-39718

vsock/virtio: Validate length in packet header before skb_put()

CVSS3: 5.5
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-39718

In the Linux kernel, the following vulnerability has been resolved: v ...

0%
Низкий
2 месяца назад
github логотип
GHSA-4whh-7h4c-xh74

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

0%
Низкий
2 месяца назад
oracle-oval логотип
ELSA-2025-19105

ELSA-2025-19105: kernel security update (MODERATE)

9 дней назад
oracle-oval логотип
ELSA-2025-19106

ELSA-2025-19106: kernel security update (MODERATE)

9 дней назад
oracle-oval логотип
ELSA-2025-20719

ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:3725-1

Security update for the Linux Kernel

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:03601-1

Security update for the Linux Kernel

21 день назад
suse-cvrf логотип
SUSE-SU-2025:03602-1

Security update for the Linux Kernel

21 день назад
suse-cvrf логотип
SUSE-SU-2025:03633-1

Security update for the Linux Kernel

19 дней назад
suse-cvrf логотип
SUSE-SU-2025:3751-1

Security update for the Linux Kernel

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:03600-1

Security update for the Linux Kernel

21 день назад
suse-cvrf логотип
SUSE-SU-2025:03634-1

Security update for the Linux Kernel

19 дней назад

Уязвимостей на страницу