Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68811

Опубликовано: 13 янв. 2026
Источник: redhat
CVSS3: 7.1

Описание

In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc_curpage (page index) to the page base instead of the byte offset rc_pageoff. Use rc_pageoff so copies land within the current page. Found by ZeroPath (https://zeropath.com)

Отчет

This is an out-of-bounds write caused by using a page index (rc_curpage) as a byte offset in memcpy(). A remote NFS/RDMA client can trigger memory corruption or kernel crashes by sending specially crafted inline data. In the worst case, this breaks the memory safety assumptions of the RDMA receive path and may allow cross-object memory corruption. Although the issue is remotely triggerable, the attack vector is Adjacent (AV:A), since it requires access to an authorized NFS over RDMA fabric and cannot be exploited from the general Internet. This makes it a storage-network-level vulnerability rather than a public network exposure.

Меры по смягчению последствий

To mitigate this issue, prevent module rpcrdma from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 10kernelFixedRHSA-2026:228209.02.2026
Red Hat Enterprise Linux 9kernelFixedRHSA-2026:272216.02.2026
Red Hat Enterprise Linux 9kernelFixedRHSA-2026:272216.02.2026
Red Hat Enterprise Linux 9.6 Extended Update SupportkernelFixedRHSA-2026:474517.03.2026

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2429116kernel: svcrdma: use rc_pageoff for memcpy byte offset

7.1 High

CVSS3

Связанные уязвимости

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc_curpage (page index) to the page base instead of the byte offset rc_pageoff. Use rc_pageoff so copies land within the current page. Found by ZeroPath (https://zeropath.com)

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc_curpage (page index) to the page base instead of the byte offset rc_pageoff. Use rc_pageoff so copies land within the current page. Found by ZeroPath (https://zeropath.com)

debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: s ...

github
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc_curpage (page index) to the page base instead of the byte offset rc_pageoff. Use rc_pageoff so copies land within the current page. Found by ZeroPath (https://zeropath.com)

rocky
около 1 месяца назад

Moderate: kernel security update

7.1 High

CVSS3