Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:11455

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (CVE-2024-50154)

  • kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
kernel-docnoarch553.63.1.el8_10kernel-doc-4.18.0-553.63.1.el8_10.noarch.rpm
bpftoolx86_64553.63.1.el8_10bpftool-4.18.0-553.63.1.el8_10.x86_64.rpm
kernelx86_64553.63.1.el8_10kernel-4.18.0-553.63.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.63.1.el8_10kernel-abi-stablelists-4.18.0-553.63.1.el8_10.noarch.rpm
kernel-corex86_64553.63.1.el8_10kernel-core-4.18.0-553.63.1.el8_10.x86_64.rpm
kernel-cross-headersx86_64553.63.1.el8_10kernel-cross-headers-4.18.0-553.63.1.el8_10.x86_64.rpm
kernel-debugx86_64553.63.1.el8_10kernel-debug-4.18.0-553.63.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.63.1.el8_10kernel-debug-core-4.18.0-553.63.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.63.1.el8_10kernel-debug-devel-4.18.0-553.63.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.63.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
15 дней назад

ELSA-2025-11455: kernel security update (MODERATE)

ubuntu
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: ch9200: fix uninitialised access during mii_nway_restart In mii_nway_restart() the code attempts to call mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read() utilises a local buffer called "buff", which is initialised with control_read(). However "buff" is conditionally initialised inside control_read(): if (err == size) { memcpy(data, buf, size); } If the condition of "err == size" is not met, then "buff" remains uninitialised. Once this happens the uninitialised "buff" is accessed and returned during ch9200_mdio_read(): return (buff[0] | buff[1] << 8); The problem stems from the fact that ch9200_mdio_read() ignores the return value of control_read(), leading to uinit-access of "buff". To fix this we should check the return value of control_read() and return early on error.

CVSS3: 7
redhat
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: ch9200: fix uninitialised access during mii_nway_restart In mii_nway_restart() the code attempts to call mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read() utilises a local buffer called "buff", which is initialised with control_read(). However "buff" is conditionally initialised inside control_read(): if (err == size) { memcpy(data, buf, size); } If the condition of "err == size" is not met, then "buff" remains uninitialised. Once this happens the uninitialised "buff" is accessed and returned during ch9200_mdio_read(): return (buff[0] | buff[1] << 8); The problem stems from the fact that ch9200_mdio_read() ignores the return value of control_read(), leading to uinit-access of "buff". To fix this we should check the return value of control_read() and return early on error.

nvd
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: ch9200: fix uninitialised access during mii_nway_restart In mii_nway_restart() the code attempts to call mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read() utilises a local buffer called "buff", which is initialised with control_read(). However "buff" is conditionally initialised inside control_read(): if (err == size) { memcpy(data, buf, size); } If the condition of "err == size" is not met, then "buff" remains uninitialised. Once this happens the uninitialised "buff" is accessed and returned during ch9200_mdio_read(): return (buff[0] | buff[1] << 8); The problem stems from the fact that ch9200_mdio_read() ignores the return value of control_read(), leading to uinit-access of "buff". To fix this we should check the return value of control_read() and return early on error.

debian
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: n ...