Логотип exploitDog
bind:"GHSA-268v-p5rc-rhmv" OR bind:"CVE-2025-21701"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-268v-p5rc-rhmv" OR bind:"CVE-2025-21701"

Количество 36

Количество 36

github логотип

GHSA-268v-p5rc-rhmv

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before...

CVSS3: 7.4
EPSS: Низкий
ubuntu логотип

CVE-2025-21701

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, eg. set_chan...

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2025-21701

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, eg. set_chan...

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2025-21701

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before th

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2025-21701

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2025-07711

6 месяцев назад

Уязвимость компонента net/ethtool/netlink.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03188-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03403-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03195-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03207-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03208-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03194-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03185-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03235-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03217-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03215-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03210-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03123-1

около 2 месяцев назад

Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03111-1

около 2 месяцев назад

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03100-1

около 2 месяцев назад

Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-268v-p5rc-rhmv

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before...

CVSS3: 7.4
0%
Низкий
9 месяцев назад
ubuntu логотип
CVE-2025-21701

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, eg. set_chan...

CVSS3: 4.7
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2025-21701

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, eg. set_chan...

CVSS3: 4.7
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2025-21701

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before th

CVSS3: 4.7
0%
Низкий
9 месяцев назад
debian логотип
CVE-2025-21701

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 4.7
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-07711

Уязвимость компонента net/ethtool/netlink.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.7
0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03188-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03403-1

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03195-1

Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03207-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03208-1

Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03194-1

Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03185-1

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03235-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03217-1

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03215-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03210-1

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03123-1

Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03111-1

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03100-1

Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6)

около 2 месяцев назад

Уязвимостей на страницу