Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:22395

Опубликовано: 05 дек. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: ublk: make sure ubq->canceling is set when queue is frozen (CVE-2025-22068)

  • kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724)

  • kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)

  • kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)

  • kernel: wifi: mt76: fix linked list corruption (CVE-2025-39918)

  • kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernelx86_64124.16.1.el10_1kernel-6.12.0-124.16.1.el10_1.x86_64.rpm
kernel-abi-stablelistsnoarch124.16.1.el10_1kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
kernel-abi-stablelistsnoarch124.16.1.el10_1kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
kernel-abi-stablelistsnoarch124.16.1.el10_1kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
kernel-abi-stablelistsnoarch124.16.1.el10_1kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
kernel-corex86_64124.16.1.el10_1kernel-core-6.12.0-124.16.1.el10_1.x86_64.rpm
kernel-debugx86_64124.16.1.el10_1kernel-debug-6.12.0-124.16.1.el10_1.x86_64.rpm
kernel-debug-corex86_64124.16.1.el10_1kernel-debug-core-6.12.0-124.16.1.el10_1.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64124.16.1.el10_1kernel-debuginfo-common-x86_64-6.12.0-124.16.1.el10_1.x86_64.rpm
kernel-debug-modulesx86_64124.16.1.el10_1kernel-debug-modules-6.12.0-124.16.1.el10_1.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
12 дней назад

ELSA-2025-22395: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ublk: make sure ubq->canceling is set when queue is frozen Now ublk driver depends on `ubq->canceling` for deciding if the request can be dispatched via uring_cmd & io_uring_cmd_complete_in_task(). Once ubq->canceling is set, the uring_cmd can be done via ublk_cancel_cmd() and io_uring_cmd_done(). So set ubq->canceling when queue is frozen, this way makes sure that the flag can be observed from ublk_queue_rq() reliably, and avoids use-after-free on uring_cmd.

CVSS3: 6.7
redhat
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ublk: make sure ubq->canceling is set when queue is frozen Now ublk driver depends on `ubq->canceling` for deciding if the request can be dispatched via uring_cmd & io_uring_cmd_complete_in_task(). Once ubq->canceling is set, the uring_cmd can be done via ublk_cancel_cmd() and io_uring_cmd_done(). So set ubq->canceling when queue is frozen, this way makes sure that the flag can be observed from ublk_queue_rq() reliably, and avoids use-after-free on uring_cmd.

CVSS3: 7.8
nvd
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ublk: make sure ubq->canceling is set when queue is frozen Now ublk driver depends on `ubq->canceling` for deciding if the request can be dispatched via uring_cmd & io_uring_cmd_complete_in_task(). Once ubq->canceling is set, the uring_cmd can be done via ublk_cancel_cmd() and io_uring_cmd_done(). So set ubq->canceling when queue is frozen, this way makes sure that the flag can be observed from ublk_queue_rq() reliably, and avoids use-after-free on uring_cmd.

CVSS3: 7.8
debian
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: u ...