Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:18318

Опубликовано: 26 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (CVE-2025-38351)

  • kernel: sunrpc: fix client side handling of tls alerts (CVE-2025-38571)

  • kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)

  • kernel: ipv6: reject malicious packets in ipv6_gso_segment() (CVE-2025-38572)

  • kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)

  • kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_6455.40.1.el10_0kernel-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-abi-stablelistsnoarch55.40.1.el10_0kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm
kernel-corex86_6455.40.1.el10_0kernel-core-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debugx86_6455.40.1.el10_0kernel-debug-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debug-corex86_6455.40.1.el10_0kernel-debug-core-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debuginfo-common-x86_64x86_6455.40.1.el10_0kernel-debuginfo-common-x86_64-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debug-modulesx86_6455.40.1.el10_0kernel-debug-modules-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debug-modules-corex86_6455.40.1.el10_0kernel-debug-modules-core-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debug-modules-extrax86_6455.40.1.el10_0kernel-debug-modules-extra-6.12.0-55.40.1.el10_0.x86_64.rpm
kernel-debug-uki-virtx86_6455.40.1.el10_0kernel-debug-uki-virt-6.12.0-55.40.1.el10_0.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
16 дней назад

ELSA-2025-18318: kernel security update (MODERATE)

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush In KVM guests with Hyper-V hypercalls enabled, the hypercalls HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX allow a guest to request invalidation of portions of a virtual TLB. For this, the hypercall parameter includes a list of GVAs that are supposed to be invalidated. However, when non-canonical GVAs are passed, there is currently no filtering in place and they are eventually passed to checked invocations of INVVPID on Intel / INVLPGA on AMD. While AMD's INVLPGA silently ignores non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error(): invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000 WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482 invvpid_error+0x91/0xa0 [kvm_intel] Modules linked in: kvm_intel kvm 9pnet_virtio irqbypa...

CVSS3: 7.3
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush In KVM guests with Hyper-V hypercalls enabled, the hypercalls HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX allow a guest to request invalidation of portions of a virtual TLB. For this, the hypercall parameter includes a list of GVAs that are supposed to be invalidated. However, when non-canonical GVAs are passed, there is currently no filtering in place and they are eventually passed to checked invocations of INVVPID on Intel / INVLPGA on AMD. While AMD's INVLPGA silently ignores non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error(): invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000 WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482 invvpid_error+0x91/0xa0 [kvm_intel] Modules linked in: kvm_intel kvm 9pnet_virtio irqbypa...

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush In KVM guests with Hyper-V hypercalls enabled, the hypercalls HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX allow a guest to request invalidation of portions of a virtual TLB. For this, the hypercall parameter includes a list of GVAs that are supposed to be invalidated. However, when non-canonical GVAs are passed, there is currently no filtering in place and they are eventually passed to checked invocations of INVVPID on Intel / INVLPGA on AMD. While AMD's INVLPGA silently ignores non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error(): invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000 WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482 invvpid_error+0x91/0xa0 [kvm_intel] Modules linked in: kvm_intel kvm 9pnet_virti

msrc
2 месяца назад

KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush