Количество 25
Количество 25
CVE-2025-39718
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
CVE-2025-39718
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
CVE-2025-39718
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
CVE-2025-39718
vsock/virtio: Validate length in packet header before skb_put()
CVE-2025-39718
In the Linux kernel, the following vulnerability has been resolved: v ...
GHSA-4whh-7h4c-xh74
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
ELSA-2025-21398
ELSA-2025-21398: kernel security update (MODERATE)
BDU:2025-15002
Уязвимость компонента net/vmw_vsock/virtio_transport.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:19105
Moderate: kernel security update
ELSA-2025-19105
ELSA-2025-19105: kernel security update (MODERATE)
RLSA-2025:19106
Moderate: kernel security update
ELSA-2025-19106
ELSA-2025-19106: kernel security update (MODERATE)
ELSA-2025-20719
ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-21118
ELSA-2025-21118: kernel security update (MODERATE)
ELSA-2025-21112
ELSA-2025-21112: kernel security update (MODERATE)
SUSE-SU-2025:3725-1
Security update for the Linux Kernel
SUSE-SU-2025:03601-1
Security update for the Linux Kernel
ELSA-2025-25754
ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:03602-1
Security update for the Linux Kernel
SUSE-SU-2025:03633-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-39718 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put(). | 0% Низкий | 4 месяца назад | ||
CVE-2025-39718 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put(). | CVSS3: 7.6 | 0% Низкий | 4 месяца назад | |
CVE-2025-39718 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put(). | 0% Низкий | 4 месяца назад | ||
CVE-2025-39718 vsock/virtio: Validate length in packet header before skb_put() | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39718 In the Linux kernel, the following vulnerability has been resolved: v ... | 0% Низкий | 4 месяца назад | ||
GHSA-4whh-7h4c-xh74 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put(). | 0% Низкий | 4 месяца назад | ||
ELSA-2025-21398 ELSA-2025-21398: kernel security update (MODERATE) | около 1 месяца назад | |||
BDU:2025-15002 Уязвимость компонента net/vmw_vsock/virtio_transport.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
RLSA-2025:19105 Moderate: kernel security update | около 1 месяца назад | |||
ELSA-2025-19105 ELSA-2025-19105: kernel security update (MODERATE) | около 2 месяцев назад | |||
RLSA-2025:19106 Moderate: kernel security update | около 2 месяцев назад | |||
ELSA-2025-19106 ELSA-2025-19106: kernel security update (MODERATE) | около 2 месяцев назад | |||
ELSA-2025-20719 ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2025-21118 ELSA-2025-21118: kernel security update (MODERATE) | 18 дней назад | |||
ELSA-2025-21112 ELSA-2025-21112: kernel security update (MODERATE) | 25 дней назад | |||
SUSE-SU-2025:3725-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2025:03601-1 Security update for the Linux Kernel | 2 месяца назад | |||
ELSA-2025-25754 ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
SUSE-SU-2025:03602-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2025:03633-1 Security update for the Linux Kernel | 2 месяца назад |
Уязвимостей на страницу