Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0445

Опубликовано: 17 янв. 2026
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (CVE-2025-39806)

  • kernel: audit: fix out-of-bounds read in audit_compare_dname_path() (CVE-2025-39840)

  • kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)

  • kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64611.20.1.el9_7kernel-5.14.0-611.20.1.el9_7.x86_64.rpm
kernel-abi-stablelistsnoarch611.20.1.el9_7kernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.20.1.el9_7kernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.20.1.el9_7kernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.20.1.el9_7kernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm
kernel-corex86_64611.20.1.el9_7kernel-core-5.14.0-611.20.1.el9_7.x86_64.rpm
kernel-debugx86_64611.20.1.el9_7kernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm
kernel-debug-corex86_64611.20.1.el9_7kernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64611.20.1.el9_7kernel-debuginfo-common-x86_64-5.14.0-611.20.1.el9_7.x86_64.rpm
kernel-debug-modulesx86_64611.20.1.el9_7kernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
24 дня назад

ELSA-2026-0445: kernel security update (MODERATE)

rocky
18 дней назад

Important: kernel security update

oracle-oval
24 дня назад

ELSA-2026-0453: kernel security update (IMPORTANT)

CVSS3: 7.1
ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() A malicious HID device can trigger a slab out-of-bounds during mt_report_fixup() by passing in report descriptor smaller than 607 bytes. mt_report_fixup() attempts to patch byte offset 607 of the descriptor with 0x25 by first checking if byte offset 607 is 0x15 however it lacks bounds checks to verify if the descriptor is big enough before conducting this check. Fix this bug by ensuring the descriptor size is at least 608 bytes before accessing it. Below is the KASAN splat after the out of bounds access happens: [ 13.671954] ================================================================== [ 13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110 [ 13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10 [ 13.673297] [ 13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83...

CVSS3: 7
redhat
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() A malicious HID device can trigger a slab out-of-bounds during mt_report_fixup() by passing in report descriptor smaller than 607 bytes. mt_report_fixup() attempts to patch byte offset 607 of the descriptor with 0x25 by first checking if byte offset 607 is 0x15 however it lacks bounds checks to verify if the descriptor is big enough before conducting this check. Fix this bug by ensuring the descriptor size is at least 608 bytes before accessing it. Below is the KASAN splat after the out of bounds access happens: [ 13.671954] ================================================================== [ 13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110 [ 13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10 [ 13.673297] [ 13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83...