Логотип exploitDog
bind:CVE-2025-23145
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-23145

Количество 37

Количество 37

ubuntu логотип

CVE-2025-23145

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). The 'subflow_req->msk' o...

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2025-23145

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). The 'subflow_req->msk' o...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-23145

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). The

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2025-23145

5 месяцев назад

mptcp: fix NULL pointer in can_accept_new_subflow

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-23145

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-3r7x-52q9-w4pw

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). ...

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-12166

9 месяцев назад

Уязвимость компонента mptcp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4283-1

22 дня назад

Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4255-1

23 дня назад

Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4243-1

23 дня назад

Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4302-1

21 день назад

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4265-1

23 дня назад

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4262-1

23 дня назад

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4239-1

24 дня назад

Security update for the Linux Kernel (Live Patch 39 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4230-1

24 дня назад

Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4227-1

24 дня назад

Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4215-1

25 дней назад

Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4200-1

25 дней назад

Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4199-1

25 дней назад

Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4167-1

27 дней назад

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-23145

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). The 'subflow_req->msk' o...

CVSS3: 5.5
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2025-23145

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). The 'subflow_req->msk' o...

CVSS3: 5.5
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2025-23145

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). The

CVSS3: 5.5
0%
Низкий
8 месяцев назад
msrc логотип
CVE-2025-23145

mptcp: fix NULL pointer in can_accept_new_subflow

CVSS3: 5.5
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-23145

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
0%
Низкий
8 месяцев назад
github логотип
GHSA-3r7x-52q9-w4pw

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P) subflow_syn_recv_sock (./net/mptcp/subflow.c:854) tcp_check_req (./net/ipv4/tcp_minisocks.c:863) tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268) ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207) ip_local_deliver_finish (./net/ipv4/ip_input.c:234) ip_local_deliver (./net/ipv4/ip_input.c:254) ip_rcv_finish (./net/ipv4/ip_input.c:449) ... According to the debug log, the same req received two SYN-ACK in a very short time, very likely because the client retransmits the syn ack due to multiple reasons. Even if the packets are transmitted with a relevant time interval, they can be processed by the server on different CPUs concurrently). ...

CVSS3: 5.5
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-12166

Уязвимость компонента mptcp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:4283-1

Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5)

22 дня назад
suse-cvrf логотип
SUSE-SU-2025:4255-1

Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)

23 дня назад
suse-cvrf логотип
SUSE-SU-2025:4243-1

Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5)

23 дня назад
suse-cvrf логотип
SUSE-SU-2025:4302-1

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

21 день назад
suse-cvrf логотип
SUSE-SU-2025:4265-1

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

23 дня назад
suse-cvrf логотип
SUSE-SU-2025:4262-1

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

23 дня назад
suse-cvrf логотип
SUSE-SU-2025:4239-1

Security update for the Linux Kernel (Live Patch 39 for SUSE Linux Enterprise 15 SP4)

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:4230-1

Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:4227-1

Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:4215-1

Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)

25 дней назад
suse-cvrf логотип
SUSE-SU-2025:4200-1

Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

25 дней назад
suse-cvrf логотип
SUSE-SU-2025:4199-1

Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4)

25 дней назад
suse-cvrf логотип
SUSE-SU-2025:4167-1

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

27 дней назад

Уязвимостей на страницу