INFSA-2025:21112: kernel security update

Information about definition

Identificator: INFSA-2025:21112

Type: security

Release date: 2025-12-01 14:42:26 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2022-50087

    In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails.

  • CVE-2025-38566

    A remotely reachable flaw in the SUNRPC NFS-over-TLS server could allow a client to trigger a kernel crash by sending a crafted TLS alert. The issue lies in how the kernel processes TLS control messages, which can lead to use-after-free or invalid memory accesses during alert handling.

  • CVE-2023-53373

    The flaw is in the seqiv IV generator and can lead to a use-after-free when backlogged crypto requests return -EBUSY. Triggering it is easier locally by flooding the kernel crypto API (e.g. via AF_ALG or many concurrent AEAD requests) because the attacker must create backlog conditions. Remote triggering is much harder and only realistic for specific configurations (for example an in-kernel IPsec/TLS path that uses seqiv for AEAD). In practice this means an unprivileged local user with access to the kernel crypto interface is the most likely threat vector, while a remote attacker would need the target to both use seqiv and be inducible into heavy crypto backlog.

  • CVE-2025-38571

    In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix client side handling of tls alerts.

  • CVE-2025-39817

    In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare.

  • CVE-2025-39841

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path.

  • CVE-2025-39849

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result().

  • CVE-2023-53331

    In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init.

  • CVE-2025-39718

    In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put().

  • CVE-2022-50367

    In the Linux kernel, the following vulnerability has been resolved: fs: fix UAF/GPF bug in nilfs_mdt_destroy.

  • CVE-2023-53494

    A use-after-free in the XTS skcipher template where -EBUSY from the crypto backend (with MAY_BACKLOG) was not treated like -EINPROGRESS, causing request data to be freed while still referenced. Impact is kernel memory corruption (high integrity/availability impact).

  • CVE-2025-39702

    Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by timing attack in MAC comparison.

  • CVE-2025-40300

    Linux Kernel could allow a local attacker to obtain secrets from a hypervisor in a cloud environment, caused by a flaw in the handling of the branch target buffer (BTB) entries. This vulnerability is known as VMSCAPE.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 7.0 no information
no information 7.0 no information
no information 7.0 no information
no information 7.1 no information
no information 7.8 no information
no information 7.5 no information
no information 7.5 no information
no information 7.1 no information
no information 7.6 no information
no information 7.0 no information
no information 7.0 no information
no information 7.5 no information
no information 6.5 no information
Critical, important, moderate, low

Updated packages

loader icon Preparing to download...
Architecture: Download