Логотип exploitDog
bind:"GHSA-cwjm-393v-32x2" OR bind:"CVE-2025-39840"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-cwjm-393v-32x2" OR bind:"CVE-2025-39840"

Количество 10

Количество 10

github логотип

GHSA-cwjm-393v-32x2

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2025-39840

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2025-39840

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-39840

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2025-39840

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: a ...

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-14115

5 месяцев назад

Уязвимость функции audit_compare_dname_path() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
rocky логотип

RLSA-2026:0445

19 дней назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-0445

24 дня назад

ELSA-2026-0445: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2026:0453

19 дней назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-0453

24 дня назад

ELSA-2026-0453: kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-cwjm-393v-32x2

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7.1
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-39840

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7.1
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-39840

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-39840

In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]

CVSS3: 7.1
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-39840

In the Linux kernel, the following vulnerability has been resolved: a ...

CVSS3: 7.1
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-14115

Уязвимость функции audit_compare_dname_path() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
5 месяцев назад
rocky логотип
RLSA-2026:0445

Moderate: kernel security update

19 дней назад
oracle-oval логотип
ELSA-2026-0445

ELSA-2026-0445: kernel security update (MODERATE)

24 дня назад
rocky логотип
RLSA-2026:0453

Important: kernel security update

19 дней назад
oracle-oval логотип
ELSA-2026-0453

ELSA-2026-0453: kernel security update (IMPORTANT)

24 дня назад

Уязвимостей на страницу