INFSA-2025:13598: kernel security update

Information about definition

Identificator: INFSA-2025:13598

Type: security

Release date: 2025-10-14 17:38:54 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2025-38079

    In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept.

  • CVE-2025-38292

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory.

  • CVE-2025-38085

    In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race.

  • CVE-2025-38159

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds.

  • CVE-2025-38084

    In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: unshare page tables during VMA split, not before.

  • CVE-2024-56721

    A flaw was found in the AMD CPU erratum handling code in the Linux kernel. The erratum_1386_microcode array lacked a proper terminator, which could cause the x86_match_cpu_with_stepping() function to read beyond the end of the array. This results in undefined behavior during CPU feature detection and erratum handling. A local attacker may be able to exploit this flaw to cause a system crash or instability, affecting system availability.

  • CVE-2025-38137

    Fixes a use-after-free vulnerability in the PCI/pwrctrl subsystem. If rescan_work_func() is still executing when the pwrctrl structure is freed (e.g., upon driver removal), the system may crash or exhibit undefined behavior. The vulnerability can potentially be triggered by a local attacker with limited privileges by forcing long-running rescan work and unloading the related driver concurrently. This bug not introduced yet in any version of the Red Hat Enterprise Linux, so not affected for all versions (apart from latest Red Hat Enterprise Linux 10 where going to check this additionally).

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 6.0 no information
no information 7.0 no information
no information 7.1 no information
no information 7.1 no information
no information 7.3 no information
no information 7.1 no information
no information 7.3 no information
Critical, important, moderate, low

Updated packages

loader icon Preparing to download...
Architecture: Download