Bug 2366579
| Summary: | CVE-2025-4574 trustee-guest-components: crossbeam-channel Vulnerable to Double Free on Drop [fedora-42] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Michal Findra <mfindra> |
| Component: | trustee-guest-components | Assignee: | Uri Lublin <uril> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 42 | CC: | uril |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["62aa5787-67fa-449e-acc0-a6f259c58c81"]} | ||
| Fixed In Version: | trustee-guest-components-0.13.0-3.fc42 | Doc Type: | --- |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2025-09-26 01:09:11 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2358890 | ||
|
Description
Michal Findra
2025-05-15 14:36:39 UTC
FEDORA-2025-2408b72979 (rust-az-cvm-vtpm-0.7.4-3.fc42, rust-az-snp-vtpm-0.7.4-1.fc42, and 2 more) has been submitted as an update to Fedora 42. https://bodhi.fedoraproject.org/updates/FEDORA-2025-2408b72979 FEDORA-2025-2408b72979 has been pushed to the Fedora 42 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-2408b72979` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-2408b72979 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2025-2408b72979 (rust-az-cvm-vtpm-0.7.4-3.fc42, rust-az-snp-vtpm-0.7.4-1.fc42, and 2 more) has been pushed to the Fedora 42 stable repository. If problem still persists, please make note of it in this bug report. |