<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T18:36:15.336919+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6b965652-fb50-438c-8200-20d48505fd55/export</id>
    <title>6b965652-fb50-438c-8200-20d48505fd55</title>
    <updated>2026-05-08T18:36:15.834576+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6b965652-fb50-438c-8200-20d48505fd55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21731", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5636", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21731\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: don't allow reconnect after disconnect\n\nFollowing process can cause nbd_config UAF:\n\n1) grab nbd_config temporarily;\n\n2) nbd_genl_disconnect() flush all recv_work() and release the\ninitial reference:\n\n  nbd_genl_disconnect\n   nbd_disconnect_and_put\n    nbd_disconnect\n     flush_workqueue(nbd-&amp;gt;recv_workq)\n    if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, ...))\n     nbd_config_put\n     -&amp;gt; due to step 1), reference is still not zero\n\n3) nbd_genl_reconfigure() queue recv_work() again;\n\n  nbd_genl_reconfigure\n   config = nbd_get_config_unlocked(nbd)\n   if (!config)\n   -&amp;gt; succeed\n   if (!test_bit(NBD_RT_BOUND, ...))\n   -&amp;gt; succeed\n   nbd_reconnect_socket\n    queue_work(nbd-&amp;gt;recv_workq, &amp;amp;args-&amp;gt;work)\n\n4) step 1) release the reference;\n\n5) Finially, recv_work() will trigger UAF:\n\n  recv_work\n   nbd_config_put(nbd)\n   -&amp;gt; nbd_config is freed\n   atomic_dec(&amp;amp;config-&amp;gt;recv_threads)\n   -&amp;gt; UAF\n\nFix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so\nthat nbd_genl_reconfigure() will fail.\n\ud83d\udccf Published: 2025-02-27T02:07:35.927Z\n\ud83d\udccf Modified: 2025-02-27T02:07:35.927Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e7343fa33751cb07c1c56b666bf37cfca357130e\n2. https://git.kernel.org/stable/c/d208d2c52b652913b5eefc8ca434b0d6b757f68f\n3. https://git.kernel.org/stable/c/a8ee6ecde2b7bfb58c8a3afe8a9d2b848f580739\n4. https://git.kernel.org/stable/c/9793bd5ae4bdbdb2dde401a3cab94a6bfd05e302\n5. https://git.kernel.org/stable/c/844b8cdc681612ff24df62cdefddeab5772fadf1", "creation_timestamp": "2025-02-27T02:25:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6b965652-fb50-438c-8200-20d48505fd55/export"/>
    <published>2025-02-27T02:25:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4e3c47ad-2301-48bb-a142-e3170c1d7828/export</id>
    <title>4e3c47ad-2301-48bb-a142-e3170c1d7828</title>
    <updated>2026-05-08T18:36:15.830795+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4e3c47ad-2301-48bb-a142-e3170c1d7828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21731", "type": "seen", "source": "https://t.me/cvedetector/18983", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21731 - \"Linux NBD Uninitialized Pointer Dereference\"\", \n  \"Content\": \"CVE ID : CVE-2025-21731 \nPublished : Feb. 27, 2025, 2:15 a.m. | 50\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnbd: don't allow reconnect after disconnect  \n  \nFollowing process can cause nbd_config UAF:  \n  \n1) grab nbd_config temporarily;  \n  \n2) nbd_genl_disconnect() flush all recv_work() and release the  \ninitial reference:  \n  \n  nbd_genl_disconnect  \n   nbd_disconnect_and_put  \n    nbd_disconnect  \n     flush_workqueue(nbd-&amp;gt;recv_workq)  \n    if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, ...))  \n     nbd_config_put  \n     -&amp;gt; due to step 1), reference is still not zero  \n  \n3) nbd_genl_reconfigure() queue recv_work() again;  \n  \n  nbd_genl_reconfigure  \n   config = nbd_get_config_unlocked(nbd)  \n   if (!config)  \n   -&amp;gt; succeed  \n   if (!test_bit(NBD_RT_BOUND, ...))  \n   -&amp;gt; succeed  \n   nbd_reconnect_socket  \n    queue_work(nbd-&amp;gt;recv_workq, &amp;amp;args-&amp;gt;work)  \n  \n4) step 1) release the reference;  \n  \n5) Finially, recv_work() will trigger UAF:  \n  \n  recv_work  \n   nbd_config_put(nbd)  \n   -&amp;gt; nbd_config is freed  \n   atomic_dec(&amp;amp;config-&amp;gt;recv_threads)  \n   -&amp;gt; UAF  \n  \nFix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so  \nthat nbd_genl_reconfigure() will fail. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T04:30:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4e3c47ad-2301-48bb-a142-e3170c1d7828/export"/>
    <published>2025-02-27T04:30:18+00:00</published>
  </entry>
</feed>
