Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:3893

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241)

  • kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (CVE-2024-53150)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.50.1.el8_10bpftool-4.18.0-553.50.1.el8_10.x86_64.rpm
kernelx86_64553.50.1.el8_10kernel-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.50.1.el8_10kernel-abi-stablelists-4.18.0-553.50.1.el8_10.noarch.rpm
kernel-corex86_64553.50.1.el8_10kernel-core-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-cross-headersx86_64553.50.1.el8_10kernel-cross-headers-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-debugx86_64553.50.1.el8_10kernel-debug-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.50.1.el8_10kernel-debug-core-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.50.1.el8_10kernel-debug-devel-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.50.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.50.1.el8_10kernel-debug-modules-4.18.0-553.50.1.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
4 месяца назад

ELSA-2025-3893: kernel security update (MODERATE)

ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.

CVSS3: 5.7
redhat
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.

nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.

debian
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x ...