|
1 | 1 | --- |
2 | 2 | title: Advisory-EGI-SVG-2026-01 |
3 | 3 | permalink: /Advisory-EGI-SVG-2026-01 |
| 4 | +redirect_from: |
| 5 | + - /Advisory-SVG-CVE-2025-38499 |
| 6 | + |
| 7 | +published: false |
4 | 8 |
|
5 | 9 | --- |
| 10 | +## Advisory-EGI-SVG-2026-01 |
| 11 | + |
| 12 | +# HIGH risk Linux Kernel vulnerability on RHEL-9/10 etc |
| 13 | + |
| 14 | +Date: 2026-01-06 |
| 15 | +Updated: 2026-02-11 |
| 16 | + |
| 17 | + |
| 18 | +HIGH risk vulnerability affecting RHEL-9, RHEL-10, derivatives |
| 19 | +and other distributions, concerning clone_private_mnt(). [R 1] |
| 20 | + |
| 21 | + |
| 22 | +## IDs AND CVSS SCORE |
| 23 | + |
| 24 | +EGI SVG ID : EGI-SVG-2026-01 |
| 25 | + |
| 26 | +CVE ID : CVE-2025-38499 |
| 27 | + |
| 28 | +CVSS Score : 7.8 [R 1] |
| 29 | + |
| 30 | + |
| 31 | +## ACTIONS REQUIRED/RECOMMENDED |
| 32 | + |
| 33 | +Affected sites are recommended to update relevant components |
| 34 | +as soon as possible using information in the references below. |
| 35 | + |
| 36 | +## MITIGATION |
| 37 | + |
| 38 | +No mitigation is available [R 1] |
| 39 | + |
| 40 | +## MORE INFORMATION |
| 41 | + |
| 42 | +Other security issues were fixed at the same time as this [R 8] [R 9]. |
| 43 | + |
| 44 | +RHEL-8 and derivatives are not affected. |
| 45 | + |
| 46 | +## STATUS OF THIS ADVISORY |
| 47 | + |
| 48 | + |
| 49 | +_TLP:CLEAR information - Unlimited distribution_ |
| 50 | + |
| 51 | + |
| 52 | + https://advisories.egi.eu/Advisory-EGI-SVG-2026-01 |
| 53 | + |
| 54 | + https://advisories.egi.eu/Advisory-SVG-CVE-2025-38499 |
| 55 | + |
| 56 | +Minor updates may be made without re-distribution to the sites. |
| 57 | + |
| 58 | + |
| 59 | +## CONTACT AND OTHER INFORMATION ON SVG |
| 60 | + |
| 61 | +----------------------------- |
| 62 | + This advisory is subject to the Creative Commons licence |
| 63 | + https://creativecommons.org/licenses/by/4.0/ and |
| 64 | + the EGI (https://www.egi.eu/) Software Vulnerability Group |
| 65 | + must be credited. |
| 66 | +--- |
| 67 | + |
| 68 | +Comments or questions should be sent to |
| 69 | + svg-rat at mailman.egi.eu |
| 70 | + |
| 71 | +Vulnerabilities relevant for EGI can be reported at |
| 72 | + report-vulnerability at egi.eu |
| 73 | + |
| 74 | +(see [R 99] for further details, and other information on SVG) |
| 75 | + |
| 76 | + |
| 77 | +## REFERENCES |
| 78 | + |
| 79 | +- [R 1] <https://access.redhat.com/security/cve/CVE-2025-38499> |
| 80 | + |
| 81 | +- [R 2] <https://nvd.nist.gov/vuln/detail/CVE-2025-38499> |
| 82 | + |
| 83 | +- [R 3] <https://www.cve.org/CVERecord?id=CVE-2025-38499> |
| 84 | + |
| 85 | +- [R 4] <https://security-tracker.debian.org/tracker/CVE-2025-38499> |
| 86 | + |
| 87 | +- [R 5] <https://ubuntu.com/security/CVE-2025-38499> |
| 88 | + |
| 89 | +- [R 6] <https://errata.build.resf.org/> (RockyLinux) |
| 90 | + |
| 91 | +- [R 7] <https://errata.almalinux.org/> (AlmaLinux) |
| 92 | + |
| 93 | +- [R 8] <https://access.redhat.com/errata/RHSA-2025:23241> (RHEL9) |
6 | 94 |
|
7 | | -**Advisory EGI-SVG-2026-01 is not public yet** |
| 95 | +- [R 9] <https://access.redhat.com/errata/RHSA-2025:23279> (RHEL10) |
| 96 | + |
| 97 | +- [R 99] <https://confluence.egi.eu/display/EGIBG/SVG+Advisories> |
8 | 98 |
|
9 | | -When it is it will be here. |
| 99 | +## CREDITS |
10 | 100 |
|
11 | | -You are looking in the right place |
| 101 | +SVG was alerted to this vulnerability by Mischa Salle. |
0 commit comments