Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:1068

Опубликовано: 13 фев. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)

  • kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.37.1.el8_10bpftool-4.18.0-553.37.1.el8_10.x86_64.rpm
kernelx86_64553.37.1.el8_10kernel-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.37.1.el8_10kernel-abi-stablelists-4.18.0-553.37.1.el8_10.noarch.rpm
kernel-corex86_64553.37.1.el8_10kernel-core-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-cross-headersx86_64553.37.1.el8_10kernel-cross-headers-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-debugx86_64553.37.1.el8_10kernel-debug-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.37.1.el8_10kernel-debug-core-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.37.1.el8_10kernel-debug-devel-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.37.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.37.1.el8_10kernel-debug-modules-4.18.0-553.37.1.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
4 месяца назад

ELSA-2025-1068: kernel security update (MODERATE)

CVSS3: 7
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enabled). This has been observed to result in warnings from do_sve_acc() where SVE traps are not expected while TIF_SVE is set: | if (test_and_set_thread_flag(TIF_SVE)) | WARN_ON(1); /* SVE access shouldn't have trapped */ Warnings of this form have been reported intermittently, e.g. https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/ https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/ The race can occur when the SVE trap handler is preempted before and after manipulating the saved FPSIMD/SVE state, startin...

CVSS3: 6.3
redhat
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enabled). This has been observed to result in warnings from do_sve_acc() where SVE traps are not expected while TIF_SVE is set: | if (test_and_set_thread_flag(TIF_SVE)) | WARN_ON(1); /* SVE access shouldn't have trapped */ Warnings of this form have been reported intermittently, e.g. https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/ https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/ The race can occur when the SVE trap handler is preempted before and after manipulating the saved FPSIMD/SVE state, starting and en...

CVSS3: 7
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enabled). This has been observed to result in warnings from do_sve_acc() where SVE traps are not expected while TIF_SVE is set: | if (test_and_set_thread_flag(TIF_SVE)) | WARN_ON(1); /* SVE access shouldn't have trapped */ Warnings of this form have been reported intermittently, e.g. https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/ https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/ The race can occur when the SVE trap handler is preempted before and after manipulating the saved FPSIMD/SVE state, starting

CVSS3: 7
msrc
5 месяцев назад

Описание отсутствует