Логотип exploitDog
bind:"CVE-2025-38206" OR bind:"CVE-2025-40096" OR bind:"CVE-2025-40168" OR bind:"CVE-2025-68800"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38206" OR bind:"CVE-2025-40096" OR bind:"CVE-2025-40168" OR bind:"CVE-2025-68800"

Количество 98

Количество 98

oracle-oval логотип

ELSA-2026-3275

30 дней назад

ELSA-2026-3275: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-38206

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-38206

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2025-38206

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-38206

7 месяцев назад

exfat: fix double free in delayed_free

EPSS: Низкий
debian логотип

CVE-2025-38206

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: e ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-349q-hp2f-r4hf

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-15483

12 месяцев назад

Уязвимость функции exfat_free_upcase_table() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2025-40096

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insufficient to hit it. The bug was then only noticed and fixed after commit 9c2ba265352a ("drm/sc...

EPSS: Низкий
redhat логотип

CVE-2025-40096

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insufficient to hit it. The bug was then only noticed and fixed after commit 9c2ba265352a ("drm/sc...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-40096

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insuff

EPSS: Низкий
msrc логотип

CVE-2025-40096

4 месяца назад

drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-40096

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: d ...

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3066

около 1 месяца назад

ELSA-2026-3066: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3683-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03672-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03666-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03664-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

EPSS: Низкий
github логотип

GHSA-xpm8-g6rj-74pw

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were ins...

EPSS: Низкий
fstec логотип

BDU:2026-02718

5 месяцев назад

Уязвимость функции drm_sched_job_add_resv_dependencies() модуля drivers/gpu/drm/scheduler/sched_main.c драйвера инфраструктуры прямого рендеринга (DRI) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2026-3275

ELSA-2026-3275: kernel security update (MODERATE)

30 дней назад
ubuntu логотип
CVE-2025-38206

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.8
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2025-38206

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.3
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2025-38206

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.8
0%
Низкий
9 месяцев назад
msrc логотип
CVE-2025-38206

exfat: fix double free in delayed_free

0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-38206

In the Linux kernel, the following vulnerability has been resolved: e ...

CVSS3: 7.8
0%
Низкий
9 месяцев назад
github логотип
GHSA-349q-hp2f-r4hf

In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : free ->vol_utbl exfat_load_default_upcase_table : return error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- double free This patch set ->vol_util as NULL after freeing it.

CVSS3: 7.8
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-15483

Уязвимость функции exfat_free_upcase_table() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
12 месяцев назад
ubuntu логотип
CVE-2025-40096

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insufficient to hit it. The bug was then only noticed and fixed after commit 9c2ba265352a ("drm/sc...

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-40096

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insufficient to hit it. The bug was then only noticed and fixed after commit 9c2ba265352a ("drm/sc...

CVSS3: 7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-40096

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insuff

0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-40096

drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies

CVSS3: 7.8
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40096

In the Linux kernel, the following vulnerability has been resolved: d ...

0%
Низкий
5 месяцев назад
oracle-oval логотип
ELSA-2026-3066

ELSA-2026-3066: kernel security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:3683-1

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03672-1

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03666-1

Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03664-1

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

5 месяцев назад
github логотип
GHSA-xpm8-g6rj-74pw

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were ins...

0%
Низкий
5 месяцев назад
fstec логотип
BDU:2026-02718

Уязвимость функции drm_sched_job_add_resv_dependencies() модуля drivers/gpu/drm/scheduler/sched_main.c драйвера инфраструктуры прямого рендеринга (DRI) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7
0%
Низкий
5 месяцев назад

Уязвимостей на страницу