Updates for CVE-2022-34169 CVE-2023-25149 CVE-2025-39898

Kris Shaw 20 Reputation points
2025-12-12T20:01:00.82+00:00

We are running a Linux RedHat 8.10 Azure Virtual Machine.

Even after performing a dnf update, we are failing our security scan due to these three vulnerabilities:

  • Java CPU July 2022 Oracle Java SE, Oracle GraalVM Enterprise Edition vulnerability (CVE-2022-34169)
  • Java CPU July 2023 Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK vulnerability (CVE-2023-25149)
  • Red Hat: CVE-2025-39898: kernel: e1000e: fix heap overflow in e1000_set_eeprom (Multiple Advisories)

Please advise on how to bring this box into compliance.

TY

Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Himanshu Shekhar 1,860 Reputation points Microsoft External Staff Moderator
    2025-12-12T22:23:13.78+00:00

    Kris Shaw - Thanks for reaching Microsoft QnA platform

    To address the vulnerabilities CVE-2022-34169, CVE-2023-25149, and CVE-2025-39898 on your RedHat 8.10 Azure Virtual Machine, follow these steps:

    1. Update Java: Ensure that you have the latest updates for Oracle Java SE and GraalVM. You can do this by checking the Oracle website for the latest patches related to the mentioned CVEs. Use the following command to check for available updates:

    Bash

       sudo dnf update java-*-openjdk
    

    If you are using Oracle's Java, ensure you download the latest version directly from Oracle's site and follow their installation instructions.

    1. Kernel Update: For the kernel vulnerability (CVE-2025-39898), ensure that your system is running the latest kernel version. You can check for kernel updates using:

    Bash

       sudo dnf update kernel
    

    After updating, reboot your system to apply the changes:

    Bash

       sudo reboot
    
    1. Re-scan: After performing the updates, run your security scan again to verify that the vulnerabilities have been remediated.
    2. Regular Maintenance: To prevent future vulnerabilities, regularly check for updates and apply them promptly. You can automate this process using Azure Automation Update Management or configure your system to check for updates automatically.

    By following these steps, you should be able to bring your Azure VM into compliance regarding the specified vulnerabilities.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.