Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:19105

Опубликовано: 06 нояб. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)

  • kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)

  • kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751)

  • kernel: fs/smb: Fix inconsistent refcnt update (CVE-2025-39819)

  • kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.58.1.el9_6kernel-5.14.0-570.58.1.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.58.1.el9_6kernel-abi-stablelists-5.14.0-570.58.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.58.1.el9_6kernel-abi-stablelists-5.14.0-570.58.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.58.1.el9_6kernel-abi-stablelists-5.14.0-570.58.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.58.1.el9_6kernel-abi-stablelists-5.14.0-570.58.1.el9_6.noarch.rpm
kernel-corex86_64570.58.1.el9_6kernel-core-5.14.0-570.58.1.el9_6.x86_64.rpm
kernel-debugx86_64570.58.1.el9_6kernel-debug-5.14.0-570.58.1.el9_6.x86_64.rpm
kernel-debug-corex86_64570.58.1.el9_6kernel-debug-core-5.14.0-570.58.1.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.58.1.el9_6kernel-debug-modules-5.14.0-570.58.1.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.58.1.el9_6kernel-debug-modules-core-5.14.0-570.58.1.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
около 2 месяцев назад

ELSA-2025-19105: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as valid"), initialization would assume a prz was valid after seeing that the buffer_size is zero (regardless of the buffer start position). This unchecked start value means it could be outside the bounds of the buffer, leading to future access panics when written to: sysdump_panic_event+0x3b4/0x5b8 atomic_notifier_call_chain+0x54/0x90 panic+0x1c8/0x42c die+0x29c/0x2a8 die_kernel_fault+0x68/0x78 __do_kernel_fault+0x1c4/0x1e0 do_bad_area+0x40/0x100 do_translation_fault+0x68/0x80 do_mem_abort+0x68/0xf8 el1_da+0x1c/0xc0 __raw_writeb+0x38/0x174 __memcpy_toio+0x40/0xac persistent_ram_update+0x44/0x12c persistent_ram_write+0x1a8/0x1b8 ramoops_pstore_write+0x198/0x1e8 pstore_console_write+0x94/0xe0 ... To avoid this, also check if the prz start is 0 during the initialization phase. If not, the next prz sanit...

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as valid"), initialization would assume a prz was valid after seeing that the buffer_size is zero (regardless of the buffer start position). This unchecked start value means it could be outside the bounds of the buffer, leading to future access panics when written to: sysdump_panic_event+0x3b4/0x5b8 atomic_notifier_call_chain+0x54/0x90 panic+0x1c8/0x42c die+0x29c/0x2a8 die_kernel_fault+0x68/0x78 __do_kernel_fault+0x1c4/0x1e0 do_bad_area+0x40/0x100 do_translation_fault+0x68/0x80 do_mem_abort+0x68/0xf8 el1_da+0x1c/0xc0 __raw_writeb+0x38/0x174 __memcpy_toio+0x40/0xac persistent_ram_update+0x44/0x12c persistent_ram_write+0x1a8/0x1b8 ramoops_pstore_write+0x198/0x1e8 pstore_console_write+0x94/0xe0 ... To avoid this, also check if the prz start is 0 during the initialization phase. If not, the next prz sanit...

CVSS3: 7.8
nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as valid"), initialization would assume a prz was valid after seeing that the buffer_size is zero (regardless of the buffer start position). This unchecked start value means it could be outside the bounds of the buffer, leading to future access panics when written to: sysdump_panic_event+0x3b4/0x5b8 atomic_notifier_call_chain+0x54/0x90 panic+0x1c8/0x42c die+0x29c/0x2a8 die_kernel_fault+0x68/0x78 __do_kernel_fault+0x1c4/0x1e0 do_bad_area+0x40/0x100 do_translation_fault+0x68/0x80 do_mem_abort+0x68/0xf8 el1_da+0x1c/0xc0 __raw_writeb+0x38/0x174 __memcpy_toio+0x40/0xac persistent_ram_update+0x44/0x12c persistent_ram_write+0x1a8/0x1b8 ramoops_pstore_write+0x198/0x1e8 pstore_console_write+0x94/0xe0 ... To avoid this, also check if the prz start is 0 during the initialization phase. If not,

CVSS3: 7.8
debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: p ...