INFSA-2025:21112: kernel security update
Information about definition
Identificator: INFSA-2025:21112
Type: security
Release date: 2025-12-01 14:42:26 UTC
Information about package
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Vulnerabilities description
- CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails.
- CVE-2025-38566
A remotely reachable flaw in the SUNRPC NFS-over-TLS server could allow a client to trigger a kernel crash by sending a crafted TLS alert. The issue lies in how the kernel processes TLS control messages, which can lead to use-after-free or invalid memory accesses during alert handling.
- CVE-2023-53373
The flaw is in the seqiv IV generator and can lead to a use-after-free when backlogged crypto requests return -EBUSY. Triggering it is easier locally by flooding the kernel crypto API (e.g. via AF_ALG or many concurrent AEAD requests) because the attacker must create backlog conditions. Remote triggering is much harder and only realistic for specific configurations (for example an in-kernel IPsec/TLS path that uses seqiv for AEAD). In practice this means an unprivileged local user with access to the kernel crypto interface is the most likely threat vector, while a remote attacker would need the target to both use seqiv and be inducible into heavy crypto backlog.
- CVE-2025-38571
In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix client side handling of tls alerts.
- CVE-2025-39817
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare.
- CVE-2025-39841
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path.
- CVE-2025-39849
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result().
- CVE-2023-53331
In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init.
- CVE-2025-39718
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put().
- CVE-2022-50367
In the Linux kernel, the following vulnerability has been resolved: fs: fix UAF/GPF bug in nilfs_mdt_destroy.
- CVE-2023-53494
A use-after-free in the XTS skcipher template where -EBUSY from the crypto backend (with MAY_BACKLOG) was not treated like -EINPROGRESS, causing request data to be freed while still referenced. Impact is kernel memory corruption (high integrity/availability impact).
- CVE-2025-39702
Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by timing attack in MAC comparison.
- CVE-2025-40300
Linux Kernel could allow a local attacker to obtain secrets from a hypervisor in a cloud environment, caused by a flaw in the handling of the branch target buffer (BTB) entries. This vulnerability is known as VMSCAPE.
Severity level
| CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
|---|---|---|---|
|
NIST — CVE-2022-50087
|
no information | 7.0 | no information |
|
NIST — CVE-2022-50367
|
no information | 7.0 | no information |
|
NIST — CVE-2023-53331
|
no information | 7.0 | no information |
|
NIST — CVE-2023-53373
|
no information | 7.1 | no information |
|
NIST — CVE-2023-53494
|
no information | 7.8 | no information |
|
NIST — CVE-2025-38566
|
no information | 7.5 | no information |
|
NIST — CVE-2025-38571
|
no information | 7.5 | no information |
|
NIST — CVE-2025-39702
|
no information | 7.1 | no information |
|
NIST — CVE-2025-39718
|
no information | 7.6 | no information |
|
NIST — CVE-2025-39817
|
no information | 7.0 | no information |
|
NIST — CVE-2025-39841
|
no information | 7.0 | no information |
|
NIST — CVE-2025-39849
|
no information | 7.5 | no information |
|
NIST — CVE-2025-40300
|
no information | 6.5 | no information |
Updated packages