发布时间: 2025年7月18日
修改时间: 2025年7月18日
A vulnerability was found in Linux Kernel up to 6.15.3 (Operating System). It has been declared as critical.The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc1 eliminates this vulnerability. Applying the patch d064c68781c19f378af1ae741d9132d35d24b2bb/8690cd3258455bbae64f809e1d3ee0f043661c71/6805582abb720681dd1c87ff677f155dcf4e86c9/03a162933c4a03b9f1a84f7d8482903c7e1e11bb/83a692a9792aa86249d68a8ac0b9d55ecdd255fa/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c/f78a786ad9a5443a29eef4dae60cde85b7375129/f914b52c379c12288b7623bb814d0508dbe7481d is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | |
Attack Vector | Local | |
CVSS评分 | N/A | 3.9 |
Attack Complexity | High | |
Privileges Required | High | |
Scope | Unchanged | |
Integrity | Low | |
User Interaction | None | |
Availability | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-2780 | kernel security update | 2025年7月25日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | kernel | Fixed |
V6 | kernel | Fixed |
KY3.5.3 | kernel | Fixed |
KY3.5.2 | kernel | Fixed |