Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:16372

Опубликовано: 03 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)

  • kernel: do_change_type(): refuse to operate on unmounted/not ours mounts (CVE-2025-38498)

  • kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.76.1.el8_10bpftool-4.18.0-553.76.1.el8_10.x86_64.rpm
kernelx86_64553.76.1.el8_10kernel-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.76.1.el8_10kernel-abi-stablelists-4.18.0-553.76.1.el8_10.noarch.rpm
kernel-corex86_64553.76.1.el8_10kernel-core-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-debugx86_64553.76.1.el8_10kernel-debug-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.76.1.el8_10kernel-debug-core-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.76.1.el8_10kernel-debug-devel-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.76.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.76.1.el8_10kernel-debug-modules-4.18.0-553.76.1.el8_10.x86_64.rpm
kernel-debug-modules-extrax86_64553.76.1.el8_10kernel-debug-modules-extra-4.18.0-553.76.1.el8_10.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
около 1 месяца назад

ELSA-2025-16372: kernel security update (MODERATE)

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53

CVSS3: 7.3
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53

CVSS3: 7.3
msrc
2 месяца назад

vsock: Fix transport_* TOCTOU