Количество 53
Количество 53
GHSA-9v4w-r8xw-999h
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.
CVE-2025-38618
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.
CVE-2025-38618
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.
CVE-2025-38618
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.
CVE-2025-38618
vsock: Do not allow binding to VMADDR_PORT_ANY
CVE-2025-38618
In the Linux kernel, the following vulnerability has been resolved: v ...
SUSE-SU-2025:4063-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6)
SUSE-SU-2025:3987-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:3888-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:4058-1
Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2025:4024-1
Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2025:3983-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)
SUSE-SU-2025:3936-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)
SUSE-SU-2025:3932-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)
SUSE-SU-2025:3927-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6)
SUSE-SU-2025:3878-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)
SUSE-SU-2025:4062-1
Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2025:4046-1
Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4000-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)
SUSE-SU-2025:3935-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-9v4w-r8xw-999h In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY. | CVSS3: 6.2 | 0% Низкий | 3 месяца назад | |
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38618 vsock: Do not allow binding to VMADDR_PORT_ANY | CVSS3: 7.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: v ... | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:4063-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) | 5 дней назад | |||
SUSE-SU-2025:3987-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 9 дней назад | |||
SUSE-SU-2025:3888-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 17 дней назад | |||
SUSE-SU-2025:4058-1 Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 5 дней назад | |||
SUSE-SU-2025:4024-1 Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 7 дней назад | |||
SUSE-SU-2025:3983-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 10 дней назад | |||
SUSE-SU-2025:3936-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 12 дней назад | |||
SUSE-SU-2025:3932-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 13 дней назад | |||
SUSE-SU-2025:3927-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) | 13 дней назад | |||
SUSE-SU-2025:3878-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | 17 дней назад | |||
SUSE-SU-2025:4062-1 Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 5 дней назад | |||
SUSE-SU-2025:4046-1 Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) | 6 дней назад | |||
SUSE-SU-2025:4000-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 9 дней назад | |||
SUSE-SU-2025:3935-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 12 дней назад |
Уязвимостей на страницу