Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:15661

Опубликовано: 10 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097)

  • kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)

  • kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)

  • kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
kernelx86_64570.42.2.el9_6kernel-5.14.0-570.42.2.el9_6.x86_64.rpm
kernel-abi-stablelistsnoarch570.42.2.el9_6kernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.42.2.el9_6kernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.42.2.el9_6kernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm
kernel-abi-stablelistsnoarch570.42.2.el9_6kernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm
kernel-corex86_64570.42.2.el9_6kernel-core-5.14.0-570.42.2.el9_6.x86_64.rpm
kernel-debugx86_64570.42.2.el9_6kernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpm
kernel-debug-corex86_64570.42.2.el9_6kernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm
kernel-debug-modulesx86_64570.42.2.el9_6kernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpm
kernel-debug-modules-corex86_64570.42.2.el9_6kernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
3 месяца назад

ELSA-2025-15661: kernel security update (IMPORTANT)

oracle-oval
3 месяца назад

ELSA-2025-15447: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 6.7
redhat
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
nvd
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.