Логотип exploitDog
bind:"CVE-2025-39898" OR bind:"CVE-2025-39971" OR bind:"CVE-2025-40248"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39898" OR bind:"CVE-2025-39971" OR bind:"CVE-2025-40248"

Количество 61

Количество 61

oracle-oval логотип

ELSA-2026-1581

22 дня назад

ELSA-2026-1581: kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2025:22395

4 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22395

4 месяца назад

ELSA-2025-22395: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-39898

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2025-39898

6 месяцев назад

A heap‑overflow vulnerability was discovered in the linux kernel e1000e driver’s e1000_set_eeprom() function, insufficient validation of the requested length for an EEPROM change could allow a local, low‑privilege user to trigger memory corruption (heap overflow). A local unprivileged user with access to the driver could exploit this flaw to cause memory corruption, potentially leading to confidentiality, integrity, and availability damage.

EPSS: Низкий
nvd логотип

CVE-2025-39898

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
msrc логотип

CVE-2025-39898

6 месяцев назад

e1000e: fix heap overflow in e1000_set_eeprom

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-46jx-rccq-85v5

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: e1000e: fix heap overflow in e1000_set_eeprom Fix a possible heap overflow in e1000_set_eeprom function by adding input validation for the requested length of the change in the EEPROM. In addition, change the variable type from int to size_t for better code practices and rearrange declarations to RCT.

EPSS: Низкий
ubuntu логотип

CVE-2025-39971

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

EPSS: Низкий
redhat логотип

CVE-2025-39971

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-39971

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

EPSS: Низкий
msrc логотип

CVE-2025-39971

5 месяцев назад

i40e: fix idx validation in config queues msg

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2025-39971

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...

EPSS: Низкий
ubuntu логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

EPSS: Низкий
redhat логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si

EPSS: Низкий
msrc логотип

CVE-2025-40248

4 месяца назад

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-40248

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: v ...

EPSS: Низкий
rocky логотип

RLSA-2025:22388

4 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22388

4 месяца назад

ELSA-2025-22388: kernel security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2026-1581

ELSA-2026-1581: kernel security update (IMPORTANT)

22 дня назад
rocky логотип
RLSA-2025:22395

Moderate: kernel security update

4 месяца назад
oracle-oval логотип
ELSA-2025-22395

ELSA-2025-22395: kernel security update (MODERATE)

4 месяца назад
ubuntu логотип
CVE-2025-39898

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
redhat логотип
CVE-2025-39898

A heap‑overflow vulnerability was discovered in the linux kernel e1000e driver’s e1000_set_eeprom() function, insufficient validation of the requested length for an EEPROM change could allow a local, low‑privilege user to trigger memory corruption (heap overflow). A local unprivileged user with access to the driver could exploit this flaw to cause memory corruption, potentially leading to confidentiality, integrity, and availability damage.

6 месяцев назад
nvd логотип
CVE-2025-39898

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
msrc логотип
CVE-2025-39898

e1000e: fix heap overflow in e1000_set_eeprom

CVSS3: 9.8
6 месяцев назад
github логотип
GHSA-46jx-rccq-85v5

In the Linux kernel, the following vulnerability has been resolved: e1000e: fix heap overflow in e1000_set_eeprom Fix a possible heap overflow in e1000_set_eeprom function by adding input validation for the requested length of the change in the EEPROM. In addition, change the variable type from int to size_t for better code practices and rearrange declarations to RCT.

6 месяцев назад
ubuntu логотип
CVE-2025-39971

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-39971

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

CVSS3: 7.6
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-39971

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-39971

i40e: fix idx validation in config queues msg

CVSS3: 9.8
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-39971

In the Linux kernel, the following vulnerability has been resolved: i ...

0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...

CVSS3: 7
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-40248

vsock: Ignore signal/timeout on connect() if already established

CVSS3: 6.3
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40248

In the Linux kernel, the following vulnerability has been resolved: v ...

0%
Низкий
4 месяца назад
rocky логотип
RLSA-2025:22388

Moderate: kernel security update

4 месяца назад
oracle-oval логотип
ELSA-2025-22388

ELSA-2025-22388: kernel security update (MODERATE)

4 месяца назад

Уязвимостей на страницу