Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:23241

Опубликовано: 23 дек. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499)

  • kernel: iommufd: Fix race during abort for file descriptors (CVE-2025-39966)

  • kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails (CVE-2025-40176)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64611.16.1.el9_7kernel-5.14.0-611.16.1.el9_7.x86_64.rpm
kernel-abi-stablelistsnoarch611.16.1.el9_7kernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.16.1.el9_7kernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.16.1.el9_7kernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.16.1.el9_7kernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm
kernel-corex86_64611.16.1.el9_7kernel-core-5.14.0-611.16.1.el9_7.x86_64.rpm
kernel-debugx86_64611.16.1.el9_7kernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpm
kernel-debug-corex86_64611.16.1.el9_7kernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64611.16.1.el9_7kernel-debuginfo-common-x86_64-5.14.0-611.16.1.el9_7.x86_64.rpm
kernel-debug-modulesx86_64611.16.1.el9_7kernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
15 дней назад

ELSA-2025-23241: kernel security update (IMPORTANT)

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.

CVSS3: 7
redhat
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.

CVSS3: 8.2
msrc
4 месяца назад

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns