Логотип exploitDog
bind:"CVE-2025-38495" OR bind:"CVE-2025-38494" OR bind:"CVE-2025-38499" OR bind:"CVE-2025-38618"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38495" OR bind:"CVE-2025-38494" OR bind:"CVE-2025-38499" OR bind:"CVE-2025-38618"

Количество 165

Количество 165

suse-cvrf логотип

SUSE-SU-2025:02969-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02853-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02997-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-9v4w-r8xw-999h

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03011-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-cc85-5h45-qhc8

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4063-1

5 дней назад

Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3987-1

9 дней назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3888-1

17 дней назад

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02923-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03204-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4058-1

5 дней назад

Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4024-1

7 дней назад

Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3983-1

10 дней назад

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3936-1

12 дней назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3932-1

13 дней назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3927-1

13 дней назад

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3878-1

17 дней назад

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3770-1

24 дня назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3720-1

26 дней назад

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:02969-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02853-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02997-1

Security update for the Linux Kernel

3 месяца назад
github логотип
GHSA-9v4w-r8xw-999h

In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.

0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03011-1

Security update for the Linux Kernel

3 месяца назад
github логотип
GHSA-cc85-5h45-qhc8

In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.

0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4063-1

Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6)

5 дней назад
suse-cvrf логотип
SUSE-SU-2025:3987-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)

9 дней назад
suse-cvrf логотип
SUSE-SU-2025:3888-1

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:02923-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03204-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4058-1

Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5)

5 дней назад
suse-cvrf логотип
SUSE-SU-2025:4024-1

Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)

7 дней назад
suse-cvrf логотип
SUSE-SU-2025:3983-1

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)

10 дней назад
suse-cvrf логотип
SUSE-SU-2025:3936-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:3932-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:3927-1

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6)

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:3878-1

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:3770-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:3720-1

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)

26 дней назад

Уязвимостей на страницу