Описание
Important: kernel security update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
-
kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
-
kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
-
kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
-
kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
-
kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
-
kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Затронутые продукты
Rocky Linux 9
Ссылки на источники
Исправления
- Red Hat - 2365024
- Red Hat - 2376392
- Red Hat - 2376406
- Red Hat - 2382054
- Red Hat - 2383509
- Red Hat - 2383513
- Red Hat - 2387866
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.