Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0786

Опубликовано: 24 янв. 2026
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_64124.28.1.el10_1kernel-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-uki-virtx86_64124.28.1.el10_1kernel-uki-virt-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-debug-corex86_64124.28.1.el10_1kernel-debug-core-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-modules-corex86_64124.28.1.el10_1kernel-modules-core-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-modules-extra-matchedx86_64124.28.1.el10_1kernel-modules-extra-matched-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-modulesx86_64124.28.1.el10_1kernel-modules-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-toolsx86_64124.28.1.el10_1kernel-tools-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-debug-modules-extrax86_64124.28.1.el10_1kernel-debug-modules-extra-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-debugx86_64124.28.1.el10_1kernel-debug-6.12.0-124.28.1.el10_1.x86_64.rpm
kernel-uki-virt-addonsx86_64124.28.1.el10_1kernel-uki-virt-addons-6.12.0-124.28.1.el10_1.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

ubuntu
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70 Read of size 4...

nvd
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_mon

CVSS3: 7.8
msrc
около 2 месяцев назад

libceph: fix potential use-after-free in have_mon_and_osd_map()

debian
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: l ...

github
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_...