Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:9080

Опубликовано: 04 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: eth: bnxt: fix truesize for mb-xdp-pass case (CVE-2025-21961)

  • kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)

  • kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)

  • kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)

  • kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)

  • kernel: md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126)

  • kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.22.1.el9_6kernel-5.14.0-570.22.1.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.22.1.el9_6kernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.22.1.el9_6kernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.22.1.el9_6kernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.22.1.el9_6kernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpm
kernel-corex86_64570.22.1.el9_6kernel-core-5.14.0-570.22.1.el9_6.x86_64.rpm
kernel-debugx86_64570.22.1.el9_6kernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpm
kernel-debug-corex86_64570.22.1.el9_6kernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.22.1.el9_6kernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.22.1.el9_6kernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
6 месяцев назад

ELSA-2025-9080: kernel security update (IMPORTANT)

rocky
3 месяца назад

Important: kernel security update

oracle-oval
6 месяцев назад

ELSA-2025-9079: kernel security update (IMPORTANT)

CVSS3: 5.5
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix truesize for mb-xdp-pass case When mb-xdp is set and return is XDP_PASS, packet is converted from xdp_buff to sk_buff with xdp_update_skb_shared_info() in bnxt_xdp_build_skb(). bnxt_xdp_build_skb() passes incorrect truesize argument to xdp_update_skb_shared_info(). The truesize is calculated as BNXT_RX_PAGE_SIZE * sinfo->nr_frags but the skb_shared_info was wiped by napi_build_skb() before. So it stores sinfo->nr_frags before bnxt_xdp_build_skb() and use it instead of getting skb_shared_info from xdp_get_shared_info_from_buff(). Splat looks like: ------------[ cut here ]------------ WARNING: CPU: 2 PID: 0 at net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590 Modules linked in: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.14.0-rc2+ #3 RIP: 0010:skb_try_coalesce+0x504/0x590...

CVSS3: 4.7
redhat
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix truesize for mb-xdp-pass case When mb-xdp is set and return is XDP_PASS, packet is converted from xdp_buff to sk_buff with xdp_update_skb_shared_info() in bnxt_xdp_build_skb(). bnxt_xdp_build_skb() passes incorrect truesize argument to xdp_update_skb_shared_info(). The truesize is calculated as BNXT_RX_PAGE_SIZE * sinfo->nr_frags but the skb_shared_info was wiped by napi_build_skb() before. So it stores sinfo->nr_frags before bnxt_xdp_build_skb() and use it instead of getting skb_shared_info from xdp_get_shared_info_from_buff(). Splat looks like: ------------[ cut here ]------------ WARNING: CPU: 2 PID: 0 at net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590 Modules linked in: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.14.0-rc2+ #3 RIP: 0010:skb_try_coalesce+0x504/0x590...