Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:10854

Опубликовано: 03 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_6455.21.1.el10_0kernel-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-abi-stablelistsnoarch55.21.1.el10_0kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
kernel-corex86_6455.21.1.el10_0kernel-core-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debugx86_6455.21.1.el10_0kernel-debug-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debug-corex86_6455.21.1.el10_0kernel-debug-core-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debuginfo-common-x86_64x86_6455.21.1.el10_0kernel-debuginfo-common-x86_64-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debug-modulesx86_6455.21.1.el10_0kernel-debug-modules-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debug-modules-corex86_6455.21.1.el10_0kernel-debug-modules-core-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debug-modules-extrax86_6455.21.1.el10_0kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.x86_64.rpm
kernel-debug-uki-virtx86_6455.21.1.el10_0kernel-debug-uki-virt-6.12.0-55.21.1.el10_0.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix random stack corruption after get_block When get_block is called with a buffer_head allocated on the stack, such as do_mpage_readpage, stack corruption due to buffer_head UAF may occur in the following race condition situation. <CPU 0> <CPU 1> mpage_read_folio <<bh on stack>> do_mpage_readpage exfat_get_block bh_read __bh_read get_bh(bh) submit_bh wait_on_buffer ... end_buffer_read_sync __end_buffer_read_notouch unlock_buffer <<keep going>> ... ... ... ... <<bh is not valid out of mpage_read_folio>> . . another_function <<variable A on stack>> put_bh(bh) atomic_dec(bh->b_count) * stack corruption here * This patch returns -EAGAIN if a folio does not have buffers when bh_read needs to be called. By doing this, the caller can fallback to functions like block_read_full_folio(), create a buffer_head in the folio, and then call get_block again. Let's do not call bh_read() with on-stack buf...

CVSS3: 4.7
redhat
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix random stack corruption after get_block When get_block is called with a buffer_head allocated on the stack, such as do_mpage_readpage, stack corruption due to buffer_head UAF may occur in the following race condition situation. <CPU 0> <CPU 1> mpage_read_folio <<bh on stack>> do_mpage_readpage exfat_get_block bh_read __bh_read get_bh(bh) submit_bh wait_on_buffer ... end_buffer_read_sync __end_buffer_read_notouch unlock_buffer <<keep going>> ... ... ... ... <<bh is not valid out of mpage_read_folio>> . . another_function <<variable A on stack>> put_bh(bh) atomic_dec(bh->b_count) * stack corruption here * This patch returns -EAGAIN if a folio does not have buffers when bh_read needs to be called. By doing this, the caller can fallback to functions like block_read_full_folio(), create a buffer_head in the folio, and then call get_block again. Let's do not call bh_read() with on-stack buf...

CVSS3: 7
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix random stack corruption after get_block When get_block is called with a buffer_head allocated on the stack, such as do_mpage_readpage, stack corruption due to buffer_head UAF may occur in the following race condition situation. <CPU 0> <CPU 1> mpage_read_folio <<bh on stack>> do_mpage_readpage exfat_get_block bh_read __bh_read get_bh(bh) submit_bh wait_on_buffer ... end_buffer_read_sync __end_buffer_read_notouch unlock_buffer <<keep going>> ... ... ... ... <<bh is not valid out of mpage_read_folio>> . . another_function <<variable A on stack>> put_bh(bh) atomic_dec(bh->b_count) * stack corruption here

CVSS3: 7
debian
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: e ...

CVSS3: 7
github
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exfat: fix random stack corruption after get_block When get_block is called with a buffer_head allocated on the stack, such as do_mpage_readpage, stack corruption due to buffer_head UAF may occur in the following race condition situation. <CPU 0> <CPU 1> mpage_read_folio <<bh on stack>> do_mpage_readpage exfat_get_block bh_read __bh_read get_bh(bh) submit_bh wait_on_buffer ... end_buffer_read_sync __end_buffer_read_notouch unlock_buffer <<keep going>> ... ... ... ... <<bh is not valid out of mpage_read_folio>> . . another_function <<variable A on stack>> put_bh(bh) atomic_dec(bh->b_count) * stack corruption h...