Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:8643

Опубликовано: 04 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)

  • kernel: vlan: enforce underlying device type (CVE-2025-21920)

  • kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)

  • kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)

  • kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)

  • kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.21.1.el9_6kernel-5.14.0-570.21.1.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.21.1.el9_6kernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.21.1.el9_6kernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.21.1.el9_6kernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.21.1.el9_6kernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm
kernel-corex86_64570.21.1.el9_6kernel-core-5.14.0-570.21.1.el9_6.x86_64.rpm
kernel-debugx86_64570.21.1.el9_6kernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm
kernel-debug-corex86_64570.21.1.el9_6kernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.21.1.el9_6kernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.21.1.el9_6kernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
8 месяцев назад

ELSA-2025-8643: kernel security update (IMPORTANT)

rocky
4 месяца назад

Important: kernel security update

oracle-oval
7 месяцев назад

ELSA-2025-8669: kernel security update (IMPORTANT)

CVSS3: 7.1
ubuntu
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_applicant) and MRP (mrp_init_applicant) for the underlying device. As part of the initialization process, we add the multicast address of each applicant to the underlying device, by calling dev_mc_add. __dev_mc_add uses dev->addr_len to determine the length of the new multicast address. This causes an out-of-bounds read if dev->addr_len is greater than 6, since the multicast addresses provided by GARP and MRP are only 6 bytes long. This behaviour can be reproduced using the following commands: ip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo ip l set up dev gretest ip link add link gretest name vlantest type vl...

CVSS3: 7.1
redhat
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_applicant) and MRP (mrp_init_applicant) for the underlying device. As part of the initialization process, we add the multicast address of each applicant to the underlying device, by calling dev_mc_add. __dev_mc_add uses dev->addr_len to determine the length of the new multicast address. This causes an out-of-bounds read if dev->addr_len is greater than 6, since the multicast addresses provided by GARP and MRP are only 6 bytes long. This behaviour can be reproduced using the following commands: ip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo ip l set up dev gretest ip link add link gretest name vlantest type vl...