In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39702-cb30@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:19409 https://access.redhat.com/errata/RHSA-2025:19409
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:19469 https://access.redhat.com/errata/RHSA-2025:19469
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:21091 https://access.redhat.com/errata/RHSA-2025:21091
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:21112 https://access.redhat.com/errata/RHSA-2025:21112
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:21118 https://access.redhat.com/errata/RHSA-2025:21118
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:21136 https://access.redhat.com/errata/RHSA-2025:21136
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:21760 https://access.redhat.com/errata/RHSA-2025:21760
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:22095 https://access.redhat.com/errata/RHSA-2025:22095
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:22124 https://access.redhat.com/errata/RHSA-2025:22124