Количество 25
Количество 25
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si
CVE-2025-40248
vsock: Ignore signal/timeout on connect() if already established
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: v ...
GHSA-j4rg-4m7w-4hr3
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...
ELSA-2026-50060
ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-50061
ELSA-2026-50061: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-1581
ELSA-2026-1581: kernel security update (IMPORTANT)
ELSA-2025-28067
ELSA-2025-28067: Unbreakable Enterprise kernel security update (IMPORTANT)
RLSA-2026:1142
Important: kernel security update
ELSA-2026-1142
ELSA-2026-1142: kernel security update (IMPORTANT)
ELSA-2026-50007
ELSA-2026-50007: Unbreakable Enterprise kernel security update (IMPORTANT)
RLSA-2026:1143
Important: kernel security update
ELSA-2026-1143
ELSA-2026-1143: kernel security update (IMPORTANT)
RLSA-2026:1690
Important: kernel security update
ELSA-2026-1690
ELSA-2026-1690: kernel security update (IMPORTANT)
ELSA-2026-50100
ELSA-2026-50100: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-50113
ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2026:0316-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi... | 0% Низкий | 4 месяца назад | ||
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi... | CVSS3: 7 | 0% Низкий | 4 месяца назад | |
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si | 0% Низкий | 4 месяца назад | ||
CVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established | CVSS3: 6.3 | 0% Низкий | 4 месяца назад | |
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: v ... | 0% Низкий | 4 месяца назад | ||
GHSA-j4rg-4m7w-4hr3 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on... | 0% Низкий | 4 месяца назад | ||
ELSA-2026-50060 ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2026-50061 ELSA-2026-50061: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2026-1581 ELSA-2026-1581: kernel security update (IMPORTANT) | 22 дня назад | |||
ELSA-2025-28067 ELSA-2025-28067: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
RLSA-2026:1142 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1142 ELSA-2026-1142: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50007 ELSA-2026-50007: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
RLSA-2026:1143 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1143 ELSA-2026-1143: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
RLSA-2026:1690 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1690 ELSA-2026-1690: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50100 ELSA-2026-50100: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50113 ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
SUSE-SU-2026:0316-1 Security update for the Linux Kernel | около 2 месяцев назад |
Уязвимостей на страницу