Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0793

Опубликовано: 24 янв. 2026
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: drm/xe: Make dma-fences compliant with the safe access rules (CVE-2025-38703)

  • kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)

  • kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)

  • kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287)

  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64611.24.1.el9_7kernel-5.14.0-611.24.1.el9_7.x86_64.rpm
kernel-abi-stablelistsnoarch611.24.1.el9_7kernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.24.1.el9_7kernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.24.1.el9_7kernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm
kernel-abi-stablelistsnoarch611.24.1.el9_7kernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm
kernel-corex86_64611.24.1.el9_7kernel-core-5.14.0-611.24.1.el9_7.x86_64.rpm
kernel-debugx86_64611.24.1.el9_7kernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpm
kernel-debug-corex86_64611.24.1.el9_7kernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64611.24.1.el9_7kernel-debuginfo-common-x86_64-5.14.0-611.24.1.el9_7.x86_64.rpm
kernel-debug-modulesx86_64611.24.1.el9_7kernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
16 дней назад

ELSA-2026-0793: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock.

CVSS3: 7
redhat
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock.

CVSS3: 7.8
nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock.

msrc
5 месяцев назад

drm/xe: Make dma-fences compliant with the safe access rules