Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68789

Опубликовано: 13 янв. 2026
Источник: redhat

Описание

No description is available for this CVE.

Отчет

This CVE has been marked as Rejected by the assigning CNA.

Меры по смягчению последствий

To mitigate this issue, prevent the ibmpex module from being loaded if IBM PowerExecutive hardware monitoring is not required. See https://access.redhat.com/solutions/41278 for instructions on how to blacklist a kernel module.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelAffected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelAffected
Red Hat Enterprise Linux 7kernel-rtAffected
Red Hat Enterprise Linux 8kernelAffected
Red Hat Enterprise Linux 8kernel-rtAffected
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9kernel-rtAffected

Показывать по

Дополнительная информация

Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2429115kernel: hwmon: (ibmpex) fix use-after-free in high/low store

Связанные уязвимости

ubuntu
2 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

nvd
2 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVSS3: 9.8
msrc
2 месяца назад

hwmon: (ibmpex) fix use-after-free in high/low store

github
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) fix use-after-free in high/low store The ibmpex_high_low_store() function retrieves driver data using dev_get_drvdata() and uses it without validation. This creates a race condition where the sysfs callback can be invoked after the data structure is freed, leading to use-after-free. Fix by adding a NULL check after dev_get_drvdata(), and reordering operations in the deletion path to prevent TOCTOU.

CVSS3: 5.5
fstec
4 месяца назад

Уязвимость функции ibmpex_high_low_store() модуля drivers/hwmon/ibmpex.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании