Логотип exploitDog
bind:"BDU:2025-09674" OR bind:"CVE-2025-38181"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-09674" OR bind:"CVE-2025-38181"

Количество 57

Количество 57

fstec логотип

BDU:2025-09674

5 месяцев назад

Уязвимость функций calipso_req_setattr() и calipso_req_delattr() компонента calipso ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2025-38181

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not need refcounting,...

EPSS: Низкий
redhat логотип

CVE-2025-38181

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not need refcounting,...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38181

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not need r

EPSS: Низкий
msrc логотип

CVE-2025-38181

3 месяца назад

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-38181

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: c ...

EPSS: Низкий
github логотип

GHSA-5hp5-2vg6-w8h9

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not nee...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03363-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03356-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03339-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03414-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03396-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03389-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03362-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03359-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03350-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 67 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03342-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03336-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03419-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03412-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-09674

Уязвимость функций calipso_req_setattr() и calipso_req_delattr() компонента calipso ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-38181

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not need refcounting,...

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-38181

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not need refcounting,...

CVSS3: 7
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-38181

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not need r

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-38181

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().

CVSS3: 7
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-38181

In the Linux kernel, the following vulnerability has been resolved: c ...

0%
Низкий
4 месяца назад
github логотип
GHSA-5hp5-2vg6-w8h9

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calipso_req_setattr(). Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"), reqsk->rsk_listener could be NULL when SYN Cookie is returned to its client, as hinted by the leading SYN Cookie log. Here are 3 options to fix the bug: 1) Return 0 in calipso_req_setattr() 2) Return an error in calipso_req_setattr() 3) Alaways set rsk_listener 1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie for CALIPSO. 3) is also no go as there have been many efforts to reduce atomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35 ("tcp/dccp: do not touch listener sk_refcnt under synflood"). As of the blamed commit, SYN Cookie already did not nee...

0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03363-1

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03356-1

Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03339-1

Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03414-1

Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03396-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03389-1

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03362-1

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03359-1

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03350-1

Security update for the Linux Kernel (Live Patch 67 for SLE 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03342-1

Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03336-1

Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03419-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03412-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)

около 1 месяца назад

Уязвимостей на страницу