Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:19102

Опубликовано: 02 нояб. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp (CVE-2023-53297)

  • kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)

  • kernel: Bluetooth: Fix potential use-after-free when clear keys (CVE-2023-53386)

  • kernel: Bluetooth: L2CAP: Fix user-after-free (CVE-2022-50386)

  • kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849)

  • kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.81.1.el8_10bpftool-4.18.0-553.81.1.el8_10.x86_64.rpm
kernelx86_64553.81.1.el8_10kernel-4.18.0-553.81.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.81.1.el8_10kernel-abi-stablelists-4.18.0-553.81.1.el8_10.noarch.rpm
kernel-abi-stablelistsnoarch553.81.1.el8_10kernel-abi-stablelists-4.18.0-553.81.1.el8_10.noarch.rpm
kernel-corex86_64553.81.1.el8_10kernel-core-4.18.0-553.81.1.el8_10.x86_64.rpm
kernel-debugx86_64553.81.1.el8_10kernel-debug-4.18.0-553.81.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.81.1.el8_10kernel-debug-core-4.18.0-553.81.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.81.1.el8_10kernel-debug-devel-4.18.0-553.81.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.81.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.81.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.81.1.el8_10kernel-debug-modules-4.18.0-553.81.1.el8_10.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
около 2 месяцев назад

ELSA-2025-19102: kernel security update (MODERATE)

CVSS3: 8
ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix user-after-free This uses l2cap_chan_hold_unless_zero() after calling __l2cap_get_chan_blah() to prevent the following trace: Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref *kref) Bluetooth: chan 0000000023c4974d Bluetooth: parent 00000000ae861c08 ================================================================== BUG: KASAN: use-after-free in __mutex_waiter_is_first kernel/locking/mutex.c:191 [inline] BUG: KASAN: use-after-free in __mutex_lock_common kernel/locking/mutex.c:671 [inline] BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400 kernel/locking/mutex.c:729 Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix user-after-free This uses l2cap_chan_hold_unless_zero() after calling __l2cap_get_chan_blah() to prevent the following trace: Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref *kref) Bluetooth: chan 0000000023c4974d Bluetooth: parent 00000000ae861c08 ================================================================== BUG: KASAN: use-after-free in __mutex_waiter_is_first kernel/locking/mutex.c:191 [inline] BUG: KASAN: use-after-free in __mutex_lock_common kernel/locking/mutex.c:671 [inline] BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400 kernel/locking/mutex.c:729 Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

CVSS3: 8
nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix user-after-free This uses l2cap_chan_hold_unless_zero() after calling __l2cap_get_chan_blah() to prevent the following trace: Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref *kref) Bluetooth: chan 0000000023c4974d Bluetooth: parent 00000000ae861c08 ================================================================== BUG: KASAN: use-after-free in __mutex_waiter_is_first kernel/locking/mutex.c:191 [inline] BUG: KASAN: use-after-free in __mutex_lock_common kernel/locking/mutex.c:671 [inline] BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400 kernel/locking/mutex.c:729 Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

CVSS3: 8
debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: B ...