Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: RHSA-2025:22571
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux AppStream EUS (v. 10.0), Red Hat Enterprise Linux BaseOS EUS (v. 10.0), Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0), Red Hat Enterprise Linux Real Time for NFV EUS (v. 10.0), Red Hat Enterprise Linux Real Time EUS (v. 10.0)
Datum: Di, 2. Dezember 2025, 22:28
Referenzen: https://access.redhat.com/security/cve/CVE-2025-39955
https://access.redhat.com/security/cve/CVE-2025-39898
https://bugzilla.redhat.com/show_bug.cgi?id=2400628
https://access.redhat.com/security/cve/CVE-2025-39918
https://access.redhat.com/errata/RHSA-2025:22571
https://bugzilla.redhat.com/show_bug.cgi?id=2404108
https://access.redhat.com/security/cve/CVE-2025-39971
https://bugzilla.redhat.com/show_bug.cgi?id=2400598
https://bugzilla.redhat.com/show_bug.cgi?id=2402699
https://bugzilla.redhat.com/show_bug.cgi?id=2393172
https://access.redhat.com/security/cve/CVE-2025-38724
Applikationen: Linux

Originalnachricht

An update for kernel is now available for Red Hat Enterprise Linux 10.0
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: nfsd: handle get_client_locked() failure in
nfsd4_setclientid_confirm() (CVE-2025-38724)

* kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)

* kernel: wifi: mt76: fix linked list corruption (CVE-2025-39918)

* kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
(CVE-2025-39955)

* kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2025-38724: Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)
CVE-2025-39898: Heap-based Buffer Overflow (CWE-122)
CVE-2025-39918: Improper Restriction of Operations within the Bounds of a
Memory Buffer (CWE-119)
CVE-2025-39955: Exposure of Sensitive Information Due to Incompatible Policies
(CWE-213)
CVE-2025-39971: Out-of-bounds Write (CWE-787)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung