{"schema_version": "1.7.0", "id": "RLSA-2026:2282", "modified": "2026-02-15T09:10:51.687554Z", "published": "2026-02-15T09:09:20.412583Z", "upstream": ["CVE-2025-38403", "CVE-2025-38415", "CVE-2025-38730", "CVE-2025-39933", "CVE-2025-40133", "CVE-2025-40304", "CVE-2025-40322", "CVE-2025-68811"], "summary": "Moderate: kernel security update", "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415)\n\n* kernel: vsock/vmci: Clear the vmci transport packet properly when initializing it (CVE-2025-38403)\n\n* kernel: Linux kernel: Data corruption and system instability due to improper io_uring/net buffer handling (CVE-2025-38730)\n\n* kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)\n\n* kernel: mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable() (CVE-2025-40133)\n\n* kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service. (CVE-2025-40304)\n\n* kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322)\n\n* kernel: svcrdma: use rc_pageoff for memcpy byte offset (CVE-2025-68811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:10", "name": "kernel", "purl": "pkg:rpm/rocky-linux/kernel?distro=rocky-linux-10&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:6.12.0-124.35.1.el10_1"}], "database_specific": {"yum_repository": "BaseOS"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2026:2282"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429116"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414465"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401432"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419870"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393191"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383421"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383404"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419902"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}