Red Hat Enterprise Linux 9 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 16
CVE-ID CVE-2024-26660
CVE-2021-47185
CVE-2024-27025
CVE-2023-52835
CVE-2024-41039
CVE-2024-41065
CVE-2024-42226
CVE-2024-50082
CVE-2024-50074
CVE-2025-21887
CVE-2025-21905
CVE-2025-22113
CVE-2025-22104
CVE-2025-37803
CVE-2025-38089
CVE-2025-38087
CWE-ID CWE-125
CWE-667
CWE-388
CWE-119
CWE-401
CWE-399
CWE-416
CWE-476
Exploitation vector Local
Public exploit Public exploit code for vulnerability #15 is available.
Vulnerable software
Red Hat Enterprise Linux for x86_64 - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server - AUS
Operating systems & Components / Operating system

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for ARM 64 - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
Operating systems & Components / Operating system package or component

kernel (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 16 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU90334

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26660

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dcn301_stream_encoder_create() function in drivers/gpu/drm/amd/display/dc/dcn301/dcn301_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU91528

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47185

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the flush_to_ldisc() function in drivers/tty/tty_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper error handling

EUVDB-ID: #VU93453

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27025

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nbd_genl_status() function in drivers/block/nbd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU91084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52835

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the rb_alloc_aux() function in kernel/events/ring_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU95042

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41039

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the cs_dsp_adsp1_parse_sizes(), cs_dsp_adsp2_parse_sizes(), cs_dsp_load() and cs_dsp_buf_free() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Memory leak

EUVDB-ID: #VU94926

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41065

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the alloc_dispatch_log_kmem_cache() function in arch/powerpc/platforms/pseries/setup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU95063

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42226

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the handle_tx_event() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper locking

EUVDB-ID: #VU99451

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50082

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rq_qos_wake_function() function in block/blk-rq-qos.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU99445

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50074

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU106110

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21887

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovl_link_up() function in fs/overlayfs/copy_up.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Buffer overflow

EUVDB-ID: #VU106865

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21905

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the iwl_parse_tlv_firmware() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Improper locking

EUVDB-ID: #VU107736

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22113

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_handle_error(), ext4_put_super() and ext4_load_and_init_journal() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Out-of-bounds read

EUVDB-ID: #VU107688

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22104

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vnic_add_client_data(), send_login(), handle_query_ip_offload_rsp() and handle_login_rsp() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Buffer overflow

EUVDB-ID: #VU108822

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37803

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the udmabuf_create() function in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) NULL pointer dereference

EUVDB-ID: #VU112118

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2025-38089

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the svc_process_common() function in net/sunrpc/svc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

16) Use-after-free

EUVDB-ID: #VU112115

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38087

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the taprio_dev_notifier() function in net/sched/sch_taprio.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.79.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:11810


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###