Логотип exploitDog
bind:"CVE-2023-53673" OR bind:"CVE-2025-40154" OR bind:"CVE-2025-40248" OR bind:"CVE-2025-40277"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-53673" OR bind:"CVE-2025-40154" OR bind:"CVE-2025-40248" OR bind:"CVE-2025-40277"

Количество 86

Количество 86

suse-cvrf логотип

SUSE-SU-2025:4213-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4199-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4172-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4203-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4171-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3)

EPSS: Низкий
github логотип

GHSA-8q99-hhgh-7gww

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.

EPSS: Низкий
fstec логотип

BDU:2025-14951

7 месяцев назад

Уязвимость модуля sound/soc/intel/boards/bytcr_rt5640.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
rocky логотип

RLSA-2026:1690

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1690

около 2 месяцев назад

ELSA-2026-1690: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-40277

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

EPSS: Низкий
redhat логотип

CVE-2025-40277

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2025-40277

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

EPSS: Низкий
msrc логотип

CVE-2025-40277

4 месяца назад

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVSS3: 7.3
EPSS: Низкий
debian логотип

CVE-2025-40277

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: d ...

EPSS: Низкий
rocky логотип

RLSA-2026:1617

около 2 месяцев назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1617

около 2 месяцев назад

ELSA-2026-1617: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

EPSS: Низкий
redhat логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si

EPSS: Низкий
msrc логотип

CVE-2025-40248

4 месяца назад

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:4213-1

Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4199-1

Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4172-1

Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4203-1

Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4171-1

Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3)

4 месяца назад
github логотип
GHSA-8q99-hhgh-7gww

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.

0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-14951

Уязвимость модуля sound/soc/intel/boards/bytcr_rt5640.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
7 месяцев назад
rocky логотип
RLSA-2026:1690

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1690

ELSA-2026-1690: kernel security update (IMPORTANT)

около 2 месяцев назад
ubuntu логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

CVSS3: 7.8
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-40277

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVSS3: 7.3
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: d ...

0%
Низкий
4 месяца назад
rocky логотип
RLSA-2026:1617

Moderate: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1617

ELSA-2026-1617: kernel security update (MODERATE)

около 2 месяцев назад
ubuntu логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

CVSS3: 7
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-40248

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
0%
Низкий
4 месяца назад

Уязвимостей на страницу