RLSA-2025:22395

Source
https://errata.rockylinux.org/RLSA-2025:22395
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:22395.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:22395
Upstream
Published
2025-12-05T09:07:35.345619Z
Modified
2025-12-05T10:34:44.764766Z
Severity
  • 7.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
Moderate: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: ublk: make sure ubq->canceling is set when queue is frozen (CVE-2025-22068)

  • kernel: nfsd: handle getclientlocked() failure in nfsd4setclientidconfirm() (CVE-2025-38724)

  • kernel: mm/memory-failure: fix VMBUGON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)

  • kernel: e1000e: fix heap overflow in e1000seteeprom (CVE-2025-39898)

  • kernel: wifi: mt76: fix linked list corruption (CVE-2025-39918)

  • kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / kernel

Package

Name
kernel
Purl
pkg:rpm/rocky-linux/kernel?distro=rocky-linux-10&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.16.1.el10_1
Database specific
{
    "yum_repository": "BaseOS"
}