RLSA-2025:15011

Source
https://errata.rockylinux.org/RLSA-2025:15011
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:15011.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:15011
Upstream
Published
2025-10-10T05:50:32.805683Z
Modified
2025-10-10T06:32:23.004025Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: netsched: hfsc: Fix a potential UAF in hfscdequeue() too (CVE-2025-37823)

  • kernel: i40e: fix MMIO write access to an invalid page in i40eclearhw (CVE-2025-38200)

  • kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)

  • kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)

  • kernel: tipc: Fix use-after-free in tipcconnclose() (CVE-2025-38464)

  • kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)

  • kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / kernel

Package

Name
kernel
Purl
pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9-6&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:5.14.0-570.39.1.el9_6