Логотип exploitDog
bind:"CVE-2025-39730" OR bind:"CVE-2025-39955"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39730" OR bind:"CVE-2025-39955"

Количество 41

Количество 41

rocky логотип

RLSA-2025:21931

22 дня назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21931

16 дней назад

ELSA-2025-21931: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-39955

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(volun...

EPSS: Низкий
nvd логотип

CVE-2025-39955

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PR

EPSS: Низкий
msrc логотип

CVE-2025-39955

2 месяца назад

tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2025-39955

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: t ...

EPSS: Низкий
ubuntu логотип

CVE-2025-39730

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

EPSS: Низкий
redhat логотип

CVE-2025-39730

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-39730

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

EPSS: Низкий
msrc логотип

CVE-2025-39730

3 месяца назад

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-39730

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: N ...

EPSS: Низкий
github логотип

GHSA-63w2-9qrq-4h94

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62...

EPSS: Низкий
github логотип

GHSA-frvj-f982-mfmx

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

EPSS: Низкий
fstec логотип

BDU:2025-15706

5 месяцев назад

Уязвимость функции nfs_fh_to_dentry() компонента fs/nfs/export.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-17397

2 месяца назад

ELSA-2025-17397: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:19105

около 1 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19105

около 2 месяцев назад

ELSA-2025-19105: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:22388

16 дней назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22388

20 дней назад

ELSA-2025-22388: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:19106

около 2 месяцев назад

Moderate: kernel security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:21931

Moderate: kernel security update

22 дня назад
oracle-oval логотип
ELSA-2025-21931

ELSA-2025-21931: kernel security update (MODERATE)

16 дней назад
ubuntu логотип
CVE-2025-39955

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(volun...

0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-39955

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PR

0%
Низкий
2 месяца назад
msrc логотип
CVE-2025-39955

tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().

CVSS3: 7.1
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-39955

In the Linux kernel, the following vulnerability has been resolved: t ...

0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-39730

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-39730

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

CVSS3: 7.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-39730

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-39730

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-39730

In the Linux kernel, the following vulnerability has been resolved: N ...

0%
Низкий
3 месяца назад
github логотип
GHSA-63w2-9qrq-4h94

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62...

0%
Низкий
2 месяца назад
github логотип
GHSA-frvj-f982-mfmx

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-15706

Уязвимость функции nfs_fh_to_dentry() компонента fs/nfs/export.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
5 месяцев назад
oracle-oval логотип
ELSA-2025-17397

ELSA-2025-17397: kernel security update (MODERATE)

2 месяца назад
rocky логотип
RLSA-2025:19105

Moderate: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-19105

ELSA-2025-19105: kernel security update (MODERATE)

около 2 месяцев назад
rocky логотип
RLSA-2025:22388

Moderate: kernel security update

16 дней назад
oracle-oval логотип
ELSA-2025-22388

ELSA-2025-22388: kernel security update (MODERATE)

20 дней назад
rocky логотип
RLSA-2025:19106

Moderate: kernel security update

около 2 месяцев назад

Уязвимостей на страницу