Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:15008

Опубликовано: 08 сент. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)

  • kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)

  • kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)

  • kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate (CVE-2025-38477)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.72.1.el8_10bpftool-4.18.0-553.72.1.el8_10.x86_64.rpm
kernelx86_64553.72.1.el8_10kernel-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.72.1.el8_10kernel-abi-stablelists-4.18.0-553.72.1.el8_10.noarch.rpm
kernel-corex86_64553.72.1.el8_10kernel-core-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-debugx86_64553.72.1.el8_10kernel-debug-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.72.1.el8_10kernel-debug-core-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.72.1.el8_10kernel-debug-devel-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.72.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.72.1.el8_10kernel-debug-modules-4.18.0-553.72.1.el8_10.x86_64.rpm
kernel-debug-modules-extrax86_64553.72.1.el8_10kernel-debug-modules-extra-4.18.0-553.72.1.el8_10.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
29 дней назад

ELSA-2025-15008: kernel security update (MODERATE)

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

CVSS3: 7.3
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r

msrc
около 2 месяцев назад

Описание отсутствует