Логотип exploitDog
bind:"GHSA-pxm9-5xjv-gw34" OR bind:"CVE-2025-40084"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-pxm9-5xjv-gw34" OR bind:"CVE-2025-40084"

Количество 7

Количество 7

github логотип

GHSA-pxm9-5xjv-gw34

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

EPSS: Низкий
ubuntu логотип

CVE-2025-40084

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

EPSS: Низкий
redhat логотип

CVE-2025-40084

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

EPSS: Низкий
nvd логотип

CVE-2025-40084

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

EPSS: Низкий
msrc логотип

CVE-2025-40084

4 месяца назад

ksmbd: transport_ipc: validate payload size before reading handle

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-40084

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: k ...

EPSS: Низкий
fstec логотип

BDU:2026-02777

5 месяцев назад

Уязвимость компонента transport_ipc ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-pxm9-5xjv-gw34

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-40084

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-40084

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-40084

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-40084

ksmbd: transport_ipc: validate payload size before reading handle

CVSS3: 5.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40084

In the Linux kernel, the following vulnerability has been resolved: k ...

0%
Низкий
5 месяцев назад
fstec логотип
BDU:2026-02777

Уязвимость компонента transport_ipc ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.7
0%
Низкий
5 месяцев назад

Уязвимостей на страницу