Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:4341

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)

  • kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322)

  • kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)

  • kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)

  • kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
bpftoolx86_64503.40.1.el9_5bpftool-7.4.0-503.40.1.el9_5.x86_64.rpm
kernelx86_64503.40.1.el9_5kernel-5.14.0-503.40.1.el9_5.x86_64.rpm
kernel-abi-stablelistsnoarch503.40.1.el9_5kernel-abi-stablelists-5.14.0-503.40.1.el9_5.noarch.rpm
kernel-abi-stablelistsnoarch503.40.1.el9_5kernel-abi-stablelists-5.14.0-503.40.1.el9_5.noarch.rpm
kernel-abi-stablelistsnoarch503.40.1.el9_5kernel-abi-stablelists-5.14.0-503.40.1.el9_5.noarch.rpm
kernel-abi-stablelistsnoarch503.40.1.el9_5kernel-abi-stablelists-5.14.0-503.40.1.el9_5.noarch.rpm
kernel-corex86_64503.40.1.el9_5kernel-core-5.14.0-503.40.1.el9_5.x86_64.rpm
kernel-debugx86_64503.40.1.el9_5kernel-debug-5.14.0-503.40.1.el9_5.x86_64.rpm
kernel-debug-corex86_64503.40.1.el9_5kernel-debug-core-5.14.0-503.40.1.el9_5.x86_64.rpm
kernel-debug-modulesx86_64503.40.1.el9_5kernel-debug-modules-5.14.0-503.40.1.el9_5.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
8 месяцев назад

ELSA-2025-4341: kernel security update (IMPORTANT)

CVSS3: 7.1
ubuntu
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODALIAS is not the last one within its @env parameter, fixed by correcting size to memmove.

CVSS3: 6.1
redhat
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODALIAS is not the last one within its @env parameter, fixed by correcting size to memmove.

CVSS3: 7.1
nvd
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODALIAS is not the last one within its @env parameter, fixed by correcting size to memmove.

CVSS3: 7.1
debian
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: k ...