Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:23279

Опубликовано: 24 дек. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499)

  • kernel: net: tun: Update napi->skb after XDP process (CVE-2025-39984)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_64124.21.1.el10_1kernel-6.12.0-124.21.1.el10_1.x86_64.rpm
kernel-abi-stablelistsnoarch124.21.1.el10_1kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
kernel-abi-stablelistsnoarch124.21.1.el10_1kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
kernel-abi-stablelistsnoarch124.21.1.el10_1kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
kernel-abi-stablelistsnoarch124.21.1.el10_1kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
kernel-corex86_64124.21.1.el10_1kernel-core-6.12.0-124.21.1.el10_1.x86_64.rpm
kernel-debugx86_64124.21.1.el10_1kernel-debug-6.12.0-124.21.1.el10_1.x86_64.rpm
kernel-debug-corex86_64124.21.1.el10_1kernel-debug-core-6.12.0-124.21.1.el10_1.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64124.21.1.el10_1kernel-debuginfo-common-x86_64-6.12.0-124.21.1.el10_1.x86_64.rpm
kernel-debug-modulesx86_64124.21.1.el10_1kernel-debug-modules-6.12.0-124.21.1.el10_1.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
около 2 месяцев назад

ELSA-2025-23279: kernel security update (IMPORTANT)

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: tun: Update napi->skb after XDP process The syzbot report a UAF issue: BUG: KASAN: slab-use-after-free in skb_reset_mac_header include/linux/skbuff.h:3150 [inline] BUG: KASAN: slab-use-after-free in napi_frags_skb net/core/gro.c:723 [inline] BUG: KASAN: slab-use-after-free in napi_gro_frags+0x6e/0x1030 net/core/gro.c:758 Read of size 8 at addr ffff88802ef22c18 by task syz.0.17/6079 CPU: 0 UID: 0 PID: 6079 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) Call Trace: <TASK> dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x240 mm/kasan/report.c:482 kasan_report+0x118/0x150 mm/kasan/report.c:595 skb_reset_mac_header include/linux/skbuff.h:3150 [inline] napi_frags_skb net/core/gro.c:723 [inline] napi_gro_frags+0x6e/0x1030 net/core/gro.c:758 tun_get_user+0x28cb/0x3e20 drivers/net/tun.c:1920 tun_chr_write_iter+0x113/0x200 drivers/net/tun....

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: tun: Update napi->skb after XDP process The syzbot report a UAF issue: BUG: KASAN: slab-use-after-free in skb_reset_mac_header include/linux/skbuff.h:3150 [inline] BUG: KASAN: slab-use-after-free in napi_frags_skb net/core/gro.c:723 [inline] BUG: KASAN: slab-use-after-free in napi_gro_frags+0x6e/0x1030 net/core/gro.c:758 Read of size 8 at addr ffff88802ef22c18 by task syz.0.17/6079 CPU: 0 UID: 0 PID: 6079 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) Call Trace: <TASK> dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x240 mm/kasan/report.c:482 kasan_report+0x118/0x150 mm/kasan/report.c:595 skb_reset_mac_header include/linux/skbuff.h:3150 [inline] napi_frags_skb net/core/gro.c:723 [inline] napi_gro_frags+0x6e/0x1030 net/core/gro.c:758 tun_get_user+0x28cb/0x3e20 drivers/net/tun.c:1920 tun_c

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 5.5
ubuntu
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.