Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:9348

Опубликовано: 03 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)

  • kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)

  • kernel: ext4: ignore xattrs past end (CVE-2025-37738)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_6455.18.1.el10_0kernel-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-abi-stablelistsnoarch55.18.1.el10_0kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
kernel-corex86_6455.18.1.el10_0kernel-core-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debugx86_6455.18.1.el10_0kernel-debug-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debug-corex86_6455.18.1.el10_0kernel-debug-core-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debuginfo-common-x86_64x86_6455.18.1.el10_0kernel-debuginfo-common-x86_64-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debug-modulesx86_6455.18.1.el10_0kernel-debug-modules-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debug-modules-corex86_6455.18.1.el10_0kernel-debug-modules-core-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debug-modules-extrax86_6455.18.1.el10_0kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.x86_64.rpm
kernel-debug-uki-virtx86_6455.18.1.el10_0kernel-debug-uki-virt-6.12.0-55.18.1.el10_0.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
4 месяца назад

ELSA-2025-9348: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...

CVSS3: 6.4
redhat
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter) --> As module is already freed, will trigger UAF BUG: unable to handle page fault for address: fffffbfff80a702b PGD 817fc4067 P4D 8...

CVSS3: 7.8
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/unuse_pde can be avoided (2 atomic ops!) because pde->proc_ops never changes so information necessary for inode instantiation can be saved _before_ proc_register() in PDE itself and used later, avoiding pde->proc_ops->... dereference. rmmod lookup sys_delete_module proc_lookup_de pde_get(de); proc_get_inode(dir->i_sb, de); mod->exit() proc_remove remove_proc_subtree proc_entry_rundown(de); free_module(mod); if (S_ISREG(inode->i_mode)) if (de->proc_ops->proc_read_iter)

CVSS3: 7.8
msrc
6 месяцев назад

Описание отсутствует