CVE-2025-40176 Affecting kernel-debuginfo-common-ppc64le package, versions <0:5.14.0-611.16.1.el9_7


Severity

Recommended
high

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ROCKY9-KERNELDEBUGINFOCOMMONPPC64LE-14567197
  • published24 Dec 2025
  • disclosed12 Nov 2025

Introduced: 12 Nov 2025

CVE-2025-40176  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:9 kernel-debuginfo-common-ppc64le to version 0:5.14.0-611.16.1.el9_7 or higher.
This issue was patched in RLSA-2025:23241.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-debuginfo-common-ppc64le package and not the kernel-debuginfo-common-ppc64le package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

tls: wait for pending async decryptions if tls_strp_msg_hold fails

Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into userspace memory after the recv() call has returned).

In this case, wait for all pending decryption requests.

CVSS Base Scores

version 3.1