Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:8137

Опубликовано: 03 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)

  • kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_6455.13.1.el10_0kernel-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-abi-stablelistsnoarch55.13.1.el10_0kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
kernel-corex86_6455.13.1.el10_0kernel-core-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debugx86_6455.13.1.el10_0kernel-debug-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debug-corex86_6455.13.1.el10_0kernel-debug-core-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debuginfo-common-x86_64x86_6455.13.1.el10_0kernel-debuginfo-common-x86_64-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debug-modulesx86_6455.13.1.el10_0kernel-debug-modules-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debug-modules-corex86_6455.13.1.el10_0kernel-debug-modules-core-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debug-modules-extrax86_6455.13.1.el10_0kernel-debug-modules-extra-6.12.0-55.13.1.el10_0.x86_64.rpm
kernel-debug-uki-virtx86_6455.13.1.el10_0kernel-debug-uki-virt-6.12.0-55.13.1.el10_0.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
4 месяца назад

ELSA-2025-8137: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 __vsock_bind+0x62e/0x730 vsock_bind+0x9...

CVSS3: 7.8
redhat
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 __vsock_bind+0x62e/0x730 vsock_bind+0x9...

CVSS3: 7.8
nvd
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kas

CVSS3: 7.8
msrc
7 месяцев назад

Описание отсутствует