Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:9302

Опубликовано: 04 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: ice: Fix deinitializing VF in error path (CVE-2025-21883)

  • kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)

  • kernel: ibmvnic: Use kernel helpers for hex dumps (CVE-2025-22104)

  • kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)

  • kernel: ext4: ignore xattrs past end (CVE-2025-37738)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.23.1.el9_6kernel-5.14.0-570.23.1.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.23.1.el9_6kernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.23.1.el9_6kernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.23.1.el9_6kernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.23.1.el9_6kernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpm
kernel-corex86_64570.23.1.el9_6kernel-core-5.14.0-570.23.1.el9_6.x86_64.rpm
kernel-debugx86_64570.23.1.el9_6kernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpm
kernel-debug-corex86_64570.23.1.el9_6kernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.23.1.el9_6kernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.23.1.el9_6kernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
6 месяцев назад

ELSA-2025-9302: kernel security update (MODERATE)

oracle-oval
6 месяцев назад

ELSA-2025-9896: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a similar stack trace: BUG: KASAN: use-af...

CVSS3: 6.7
redhat
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a similar stack trace: BUG: KASAN: use-af...

CVSS3: 7.8
nvd
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a si