Логотип exploitDog
bind:"BDU:2025-14977" OR bind:"CVE-2025-38588"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-14977" OR bind:"CVE-2025-38588"

Количество 25

Количество 25

fstec логотип

BDU:2025-14977

6 месяцев назад

Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2025-38588

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2025-38588

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-38588

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-38588

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xmch-89f7-f57m

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0284-1

12 дней назад

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0283-1

12 дней назад

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0274-1

12 дней назад

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0270-1

12 дней назад

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0262-1

13 дней назад

Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0171-1

16 дней назад

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0148-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0144-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0269-1

12 дней назад

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03272-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03301-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20662

4 месяца назад

ELSA-2025-20662: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03382-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03290-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-14977

Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7
0%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2025-38588

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-38588

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-38588

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-38588

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 5.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-xmch-89f7-f57m

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent infinite loop in rt6_nlmsg_size() While testing prior patch, I was able to trigger an infinite loop in rt6_nlmsg_size() in the following place: list_for_each_entry_rcu(sibling, &f6i->fib6_siblings, fib6_siblings) { rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len); } This is because fib6_del_route() and fib6_add_rt2node() uses list_del_rcu(), which can confuse rcu readers, because they might no longer see the head of the list. Restart the loop if f6i->fib6_nsiblings is zero.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0284-1

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0283-1

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0274-1

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0270-1

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0262-1

Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0171-1

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0148-1

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

18 дней назад
suse-cvrf логотип
SUSE-SU-2026:0144-1

Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

18 дней назад
suse-cvrf логотип
SUSE-SU-2026:0269-1

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2025:03272-1

Security update for the Linux Kernel

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03301-1

Security update for the Linux Kernel

4 месяца назад
oracle-oval логотип
ELSA-2025-20662

ELSA-2025-20662: Unbreakable Enterprise kernel security update (IMPORTANT)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03382-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03290-1

Security update for the Linux Kernel

5 месяцев назад

Уязвимостей на страницу