Описание
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Меры по смягчению последствий
To mitigate this issue, prevent the module gru from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 7 | kernel-rt | Out of support scope | ||
Red Hat Enterprise Linux 8 | kernel | Affected | ||
Red Hat Enterprise Linux 8 | kernel-rt | Affected | ||
Red Hat Enterprise Linux 9 | kernel-rt | Will not fix | ||
Red Hat Virtualization 4 | redhat-virtualization-host | Not affected | ||
Red Hat Enterprise Linux 9 | kernel | Fixed | RHSA-2025:8333 | 02.06.2025 |
Red Hat Enterprise Linux 9 | kernel | Fixed | RHSA-2025:8333 | 02.06.2025 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU dri ...
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)
Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)
EPSS
7 High
CVSS3