Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:11861

Опубликовано: 04 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)

  • kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)

  • kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)

  • kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)

  • kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)

  • kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)

  • kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)

  • kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)

  • kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)

  • kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.30.1.el9_6kernel-5.14.0-570.30.1.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.30.1.el9_6kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.30.1.el9_6kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.30.1.el9_6kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.30.1.el9_6kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm
kernel-corex86_64570.30.1.el9_6kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm
kernel-debugx86_64570.30.1.el9_6kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm
kernel-debug-corex86_64570.30.1.el9_6kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.30.1.el9_6kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.30.1.el9_6kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
5 месяцев назад

ELSA-2025-11861: kernel security update (MODERATE)

rocky
3 месяца назад

Important: kernel security update

oracle-oval
5 месяцев назад

ELSA-2025-11428: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>

CVSS3: 4.7
redhat
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>