Логотип exploitDog
bind:"CVE-2025-39964" OR bind:"CVE-2025-40248" OR bind:"CVE-2025-40280"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39964" OR bind:"CVE-2025-40248" OR bind:"CVE-2025-40280"

Количество 46

Количество 46

msrc логотип

CVE-2025-40248

4 месяца назад

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: v ...

EPSS: Низкий
github логотип

GHSA-p7jc-87rf-j283

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-free of tipc_net(net)->monitors[] in tipc_mon_reinit_self(). [0] The array is protected by RTNL, but tipc_mon_reinit_self() iterates over it without RTNL. tipc_mon_reinit_self() is called from tipc_net_finalize(), which is always under RTNL except for tipc_net_finalize_work(). Let's hold RTNL in tipc_net_finalize_work(). [0]: BUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] BUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162 Read of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989 CPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: events tipc_net_finalize_work Call Trace: <TASK> dump_stac...

EPSS: Низкий
github логотип

GHSA-j4rg-4m7w-4hr3

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50060

2 месяца назад

ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20719

5 месяцев назад

ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1581

23 дня назад

ELSA-2026-1581: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50113

около 1 месяца назад

ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2026:1142

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1142

около 2 месяцев назад

ELSA-2026-1142: kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2026:1143

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1143

около 2 месяцев назад

ELSA-2026-1143: kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20145-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-28048

3 месяца назад

ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2026:1690

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1690

около 2 месяцев назад

ELSA-2026-1690: kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0315-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0281-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0278-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25757

5 месяцев назад

ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
msrc логотип
CVE-2025-40248

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: v ...

0%
Низкий
4 месяца назад
github логотип
GHSA-p7jc-87rf-j283

In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-free of tipc_net(net)->monitors[] in tipc_mon_reinit_self(). [0] The array is protected by RTNL, but tipc_mon_reinit_self() iterates over it without RTNL. tipc_mon_reinit_self() is called from tipc_net_finalize(), which is always under RTNL except for tipc_net_finalize_work(). Let's hold RTNL in tipc_net_finalize_work(). [0]: BUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] BUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162 Read of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989 CPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: events tipc_net_finalize_work Call Trace: <TASK> dump_stac...

0%
Низкий
4 месяца назад
github логотип
GHSA-j4rg-4m7w-4hr3

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...

0%
Низкий
4 месяца назад
oracle-oval логотип
ELSA-2026-50060

ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-20719

ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2026-1581

ELSA-2026-1581: kernel security update (IMPORTANT)

23 дня назад
oracle-oval логотип
ELSA-2026-50113

ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 месяца назад
rocky логотип
RLSA-2026:1142

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1142

ELSA-2026-1142: kernel security update (IMPORTANT)

около 2 месяцев назад
rocky логотип
RLSA-2026:1143

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1143

ELSA-2026-1143: kernel security update (IMPORTANT)

около 2 месяцев назад
suse-cvrf логотип
openSUSE-SU-2026:20145-1

Security update for the Linux Kernel

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-28048

ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
rocky логотип
RLSA-2026:1690

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1690

ELSA-2026-1690: kernel security update (IMPORTANT)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0315-1

Security update for the Linux Kernel

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0281-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0278-1

Security update for the Linux Kernel

2 месяца назад
oracle-oval логотип
ELSA-2025-25757

ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)

5 месяцев назад

Уязвимостей на страницу