<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 13:40:25 +0000</lastBuildDate>
    <item>
      <title>ae3ff402-b784-4965-a7da-cb338f8bb85e</title>
      <link>https://vulnerability.circl.lu/sighting/ae3ff402-b784-4965-a7da-cb338f8bb85e/export</link>
      <description>{"uuid": "ae3ff402-b784-4965-a7da-cb338f8bb85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21947", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10049", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21947\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix type confusion via race condition when using ipc_msg_send_request\n\nreq-&amp;gt;handle is allocated using ksmbd_acquire_id(&amp;amp;ipc_ida), based on\nida_alloc. req-&amp;gt;handle from ksmbd_ipc_login_request and\nFSCTL_PIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion\nbetween messages, resulting in access to unexpected parts of memory after\nan incorrect delivery. ksmbd check type of ipc response but missing add\ncontinue to check next ipc reponse.\n\ud83d\udccf Published: 2025-04-01T15:41:09.457Z\n\ud83d\udccf Modified: 2025-04-02T12:16:58.912Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6321bbda4244b93802d61cfe0887883aae322f4b\n2. https://git.kernel.org/stable/c/76861630b29e51373e73e7b00ad0d467b6941162\n3. https://git.kernel.org/stable/c/3cb2b2e41541fe6f9cc55ca22d4c0bd260498aea\n4. https://git.kernel.org/stable/c/1e8833c03a38e1d5d5df6484e3f670a2fd38fb76\n5. https://git.kernel.org/stable/c/e2ff19f0b7a30e03516e6eb73b948e27a55bc9d2", "creation_timestamp": "2025-04-02T12:36:38.000000Z"}</description>
      <content:encoded>{"uuid": "ae3ff402-b784-4965-a7da-cb338f8bb85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21947", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10049", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21947\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix type confusion via race condition when using ipc_msg_send_request\n\nreq-&amp;gt;handle is allocated using ksmbd_acquire_id(&amp;amp;ipc_ida), based on\nida_alloc. req-&amp;gt;handle from ksmbd_ipc_login_request and\nFSCTL_PIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion\nbetween messages, resulting in access to unexpected parts of memory after\nan incorrect delivery. ksmbd check type of ipc response but missing add\ncontinue to check next ipc reponse.\n\ud83d\udccf Published: 2025-04-01T15:41:09.457Z\n\ud83d\udccf Modified: 2025-04-02T12:16:58.912Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6321bbda4244b93802d61cfe0887883aae322f4b\n2. https://git.kernel.org/stable/c/76861630b29e51373e73e7b00ad0d467b6941162\n3. https://git.kernel.org/stable/c/3cb2b2e41541fe6f9cc55ca22d4c0bd260498aea\n4. https://git.kernel.org/stable/c/1e8833c03a38e1d5d5df6484e3f670a2fd38fb76\n5. https://git.kernel.org/stable/c/e2ff19f0b7a30e03516e6eb73b948e27a55bc9d2", "creation_timestamp": "2025-04-02T12:36:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ae3ff402-b784-4965-a7da-cb338f8bb85e/export</guid>
      <pubDate>Wed, 02 Apr 2025 12:36:38 +0000</pubDate>
    </item>
    <item>
      <title>4f222c81-3fce-480d-a1e9-7fc89ec52151</title>
      <link>https://vulnerability.circl.lu/sighting/4f222c81-3fce-480d-a1e9-7fc89ec52151/export</link>
      <description>{"uuid": "4f222c81-3fce-480d-a1e9-7fc89ec52151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-21947", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "4f222c81-3fce-480d-a1e9-7fc89ec52151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-21947", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4f222c81-3fce-480d-a1e9-7fc89ec52151/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>2fadcd5f-1243-4521-940c-f4f1d82b90a1</title>
      <link>https://vulnerability.circl.lu/sighting/2fadcd5f-1243-4521-940c-f4f1d82b90a1/export</link>
      <description>{"uuid": "2fadcd5f-1243-4521-940c-f4f1d82b90a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21947", "type": "seen", "source": "Telegram/Ig1PoEkLRkLZXw2uOx0iXI5kdj6breIEyUIy1Z-iyA-tgLY", "content": "", "creation_timestamp": "2026-04-02T11:19:48.000000Z"}</description>
      <content:encoded>{"uuid": "2fadcd5f-1243-4521-940c-f4f1d82b90a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21947", "type": "seen", "source": "Telegram/Ig1PoEkLRkLZXw2uOx0iXI5kdj6breIEyUIy1Z-iyA-tgLY", "content": "", "creation_timestamp": "2026-04-02T11:19:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2fadcd5f-1243-4521-940c-f4f1d82b90a1/export</guid>
      <pubDate>Thu, 02 Apr 2026 11:19:48 +0000</pubDate>
    </item>
  </channel>
</rss>
