Логотип exploitDog
bind:CVE-2025-39966
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-39966

Количество 8

Количество 8

ubuntu логотип

CVE-2025-39966

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects tell th...

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2025-39966

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects tell

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2025-39966

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-jrgc-8xmv-4r2m

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects te...

CVSS3: 4.7
EPSS: Низкий
rocky логотип

RLSA-2025:23241

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-23241

около 2 месяцев назад

ELSA-2025-23241: kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2026:0453

23 дня назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-0453

29 дней назад

ELSA-2026-0453: kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-39966

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects tell th...

CVSS3: 4.7
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-39966

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects tell

CVSS3: 4.7
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-39966

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 4.7
0%
Низкий
4 месяца назад
github логотип
GHSA-jrgc-8xmv-4r2m

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects te...

CVSS3: 4.7
0%
Низкий
4 месяца назад
rocky логотип
RLSA-2025:23241

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-23241

ELSA-2025-23241: kernel security update (IMPORTANT)

около 2 месяцев назад
rocky логотип
RLSA-2026:0453

Important: kernel security update

23 дня назад
oracle-oval логотип
ELSA-2026-0453

ELSA-2026-0453: kernel security update (IMPORTANT)

29 дней назад

Уязвимостей на страницу