Логотип exploitDog
bind:"CVE-2023-53673" OR bind:"CVE-2025-40154" OR bind:"CVE-2025-40248" OR bind:"CVE-2025-40277"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-53673" OR bind:"CVE-2025-40154" OR bind:"CVE-2025-40248" OR bind:"CVE-2025-40277"

Количество 70

Количество 70

suse-cvrf логотип

SUSE-SU-2025:4203-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4171-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3)

EPSS: Низкий
github логотип

GHSA-8q99-hhgh-7gww

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.

EPSS: Низкий
fstec логотип

BDU:2025-14951

5 месяцев назад

Уязвимость модуля sound/soc/intel/boards/bytcr_rt5640.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2025-40248

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

EPSS: Низкий
nvd логотип

CVE-2025-40248

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si

EPSS: Низкий
msrc логотип

CVE-2025-40248

около 2 месяцев назад

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-40248

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: v ...

EPSS: Низкий
ubuntu логотип

CVE-2025-40277

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

EPSS: Низкий
nvd логотип

CVE-2025-40277

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

EPSS: Низкий
msrc логотип

CVE-2025-40277

около 2 месяцев назад

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVSS3: 7.3
EPSS: Низкий
debian логотип

CVE-2025-40277

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: d ...

EPSS: Низкий
github логотип

GHSA-j4rg-4m7w-4hr3

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50060

20 дней назад

ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-6jjc-g279-fq4c

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0029-1

около 1 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4530-1

около 1 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4506-1

около 1 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4188-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50061

17 дней назад

ELSA-2026-50061: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:4203-1

Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4171-1

Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3)

2 месяца назад
github логотип
GHSA-8q99-hhgh-7gww

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14951

Уязвимость модуля sound/soc/intel/boards/bytcr_rt5640.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si

0%
Низкий
2 месяца назад
msrc логотип
CVE-2025-40248

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: v ...

0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-40277

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVSS3: 7.3
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-40277

In the Linux kernel, the following vulnerability has been resolved: d ...

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-j4rg-4m7w-4hr3

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...

0%
Низкий
2 месяца назад
oracle-oval логотип
ELSA-2026-50060

ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)

20 дней назад
github логотип
GHSA-6jjc-g279-fq4c

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0029-1

Security update for the Linux Kernel

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4530-1

Security update for the Linux Kernel

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4506-1

Security update for the Linux Kernel

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4188-1

Security update for the Linux Kernel

2 месяца назад
oracle-oval логотип
ELSA-2026-50061

ELSA-2026-50061: Unbreakable Enterprise kernel security update (IMPORTANT)

17 дней назад

Уязвимостей на страницу