Логотип exploitDog
bind:CVE-2025-38476
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-38476

Количество 42

Количество 42

ubuntu логотип

CVE-2025-38476

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/report.c:4...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-38476

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/report.c:4...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-38476

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/repo

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-38476

5 месяцев назад

rpl: Fix use-after-free in rpl_do_srh_inline().

EPSS: Низкий
debian логотип

CVE-2025-38476

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: r ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-7fpf-q83q-74mx

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/r...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-13511

7 месяцев назад

Уязвимость функции rpl_do_srh_inline() компонента rpl ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0188-1

20 дней назад

Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0284-1

16 дней назад

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0283-1

16 дней назад

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0274-1

17 дней назад

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0270-1

17 дней назад

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0262-1

17 дней назад

Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0187-1

20 дней назад

Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0171-1

20 дней назад

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0148-1

23 дня назад

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0144-1

23 дня назад

Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0269-1

17 дней назад

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0176-1

20 дней назад

Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0206-1

19 дней назад

Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38476

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/report.c:4...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-38476

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/report.c:4...

CVSS3: 5.5
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-38476

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/repo

CVSS3: 7.8
0%
Низкий
7 месяцев назад
msrc логотип
CVE-2025-38476

rpl: Fix use-after-free in rpl_do_srh_inline().

0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-38476

In the Linux kernel, the following vulnerability has been resolved: r ...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
github логотип
GHSA-7fpf-q83q-74mx

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a local struct instead of a pointer. [0]: [root@fedora net]# ./lwt_dst_cache_ref_loop.sh ... TEST: rpl (input) [ 57.631529] ================================================================== BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174) Read of size 40 at addr ffff888122bf96d8 by task ping6/1543 CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/r...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-13511

Уязвимость функции rpl_do_srh_inline() компонента rpl ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0188-1

Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)

20 дней назад
suse-cvrf логотип
SUSE-SU-2026:0284-1

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0283-1

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0274-1

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

17 дней назад
suse-cvrf логотип
SUSE-SU-2026:0270-1

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

17 дней назад
suse-cvrf логотип
SUSE-SU-2026:0262-1

Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)

17 дней назад
suse-cvrf логотип
SUSE-SU-2026:0187-1

Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)

20 дней назад
suse-cvrf логотип
SUSE-SU-2026:0171-1

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

20 дней назад
suse-cvrf логотип
SUSE-SU-2026:0148-1

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

23 дня назад
suse-cvrf логотип
SUSE-SU-2026:0144-1

Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

23 дня назад
suse-cvrf логотип
SUSE-SU-2026:0269-1

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

17 дней назад
suse-cvrf логотип
SUSE-SU-2026:0176-1

Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)

20 дней назад
suse-cvrf логотип
SUSE-SU-2026:0206-1

Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)

19 дней назад

Уязвимостей на страницу