INFSA-2025:12746: kernel security update

Information about definition

Identificator: INFSA-2025:12746

Type: security

Release date: 2025-08-13 13:33:50 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2022-49788

    In the Linux kernel, the following vulnerability has been resolved: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram().

  • CVE-2025-21727

    In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder.

  • CVE-2025-21928

    In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove().

  • CVE-2025-21929

    In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove().

  • CVE-2025-21962

    In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option.

  • CVE-2025-22020

    In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove.

  • CVE-2025-37890

    A use-after-free vulnerability has been identified in the Linux kernel's HFSC (Hierarchical Fair Service Curve) queuing discipline when it is configured with NETEM (Network Emulation) as a child. This flaw can lead to a kernel panic or crash due to incorrect assumptions about the queue state. Exploitation of this vulnerability requires local access with CAP_NET_ADMIN privileges and control over the qdisc (queueing discipline) setup. A local attacker could leverage this flaw to achieve denial of service or escalate privileges. Given that it affects kernel memory structures, successful exploitation could result in memory corruption, data leaks, or arbitrary write capabilities, leading to a full kernel crash.

  • CVE-2025-38052

    In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free.

  • CVE-2025-38087

    In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 7.1 no information
no information 7.0 no information
no information 6.7 no information
no information 6.7 no information
no information 5.5 no information
no information 7.0 no information
no information 7.0 no information
no information 7.8 no information
no information 7.8 no information
Critical, important, moderate, low

Updated packages