Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:17760

Опубликовано: 18 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)

  • kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)

  • kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)

  • kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.52.1.el9_6kernel-5.14.0-570.52.1.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.52.1.el9_6kernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.52.1.el9_6kernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.52.1.el9_6kernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.52.1.el9_6kernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm
kernel-corex86_64570.52.1.el9_6kernel-core-5.14.0-570.52.1.el9_6.x86_64.rpm
kernel-debugx86_64570.52.1.el9_6kernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm
kernel-debug-corex86_64570.52.1.el9_6kernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.52.1.el9_6kernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.52.1.el9_6kernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
2 месяца назад

ELSA-2025-17760: kernel security update (MODERATE)

oracle-oval
2 месяца назад

ELSA-2025-18297: kernel security update (MODERATE)

oracle-oval
4 дня назад

ELSA-2025-21063: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.