Red Hat Enterprise Linux 9 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2025-38729
CVE-2025-38718
CVE-2025-39697
CVE-2025-39702
CVE-2025-39757
CVE-2025-40300
CVE-2025-39817
CVE-2025-39849
CVE-2023-53494
CWE-ID CWE-125
CWE-667
CWE-399
CWE-20
CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Red Hat Enterprise Linux for x86_64 - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server - AUS
Operating systems & Components / Operating system

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for ARM 64 - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
Operating systems & Components / Operating system package or component

kernel (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU114808

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38729

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the validate_uac3_feature_unit() and FUNC() functions in sound/usb/validate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU114833

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38718

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sctp_rcv() function in net/sctp/input.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU114944

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-39697

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nfs_page_set_inode_ref(), nfs_page_group_lock() and nfs_inode_remove_request() functions in fs/nfs/write.c, within the nfs_page_group_unlock() function in fs/nfs/pagelist.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU114962

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-39702

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the seg6_hmac_validate_skb() function in net/ipv6/seg6_hmac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU115415

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-39757

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the convert_chmap_v3() and snd_usb_get_audioformat_uac3() functions in sound/usb/stream.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU115656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-40300

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vcpu_enter_guest() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Buffer overflow

EUVDB-ID: #VU115629

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-39817

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the efivarfs_d_compare() function in fs/efivarfs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer overflow

EUVDB-ID: #VU115995

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-39849

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the __cfg80211_connect_result() function in net/wireless/sme.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU116369

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53494

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the xts_encrypt_done() and xts_decrypt_done() functions in crypto/xts.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server - AUS: 9.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4

kernel (Red Hat package): before 5.14.0-427.100.1.el9_4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:21760


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###