-
CVE-2025-39929
- EPSS 0.02%
- Published 04.10.2025 07:30:55
- Last modified 06.10.2025 14:56:47
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path During tests of another unrelated patch I was able to trigger this error: Objects remaining on __kmem_cache_shutdown()
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
3d7c075c878ac844e33c43e506c2fa27ac7e9689
Version
f198186aa9bbd60fae7a2061f4feec614d880299
Status
affected
Version <
e7b7a93879558e77d950f1ff9a6f3daa385b33df
Version
f198186aa9bbd60fae7a2061f4feec614d880299
Status
affected
Version <
922338efaad63cfe30d459dfc59f9d69ff93ded4
Version
f198186aa9bbd60fae7a2061f4feec614d880299
Status
affected
Version <
0991418bf98f191d0c320bd25245fcffa1998c7e
Version
f198186aa9bbd60fae7a2061f4feec614d880299
Status
affected
Version <
daac51c7032036a0ca5f1aa419ad1b0471d1c6e0
Version
f198186aa9bbd60fae7a2061f4feec614d880299
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.16
Status
affected
Version <
4.16
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.154
Status
unaffected
Version <=
6.6.*
Version
6.6.108
Status
unaffected
Version <=
6.12.*
Version
6.12.49
Status
unaffected
Version <=
6.16.*
Version
6.16.9
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.033 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|