Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:13633 - Security Advisory
Issued:
2025-08-11
Updated:
2025-09-22

RHSA-2025:13633 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
  • kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
  • kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
  • kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
  • kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
  • kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
  • kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
  • kernel: selinux: Add boundary check in put_entry() (CVE-2022-50200)
  • kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2348513 - CVE-2024-58002 kernel: media: uvcvideo: Remove dangling pointers
  • BZ - 2348516 - CVE-2025-21727 kernel: padata: fix UAF in padata_reorder
  • BZ - 2356592 - CVE-2025-21928 kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
  • BZ - 2356917 - CVE-2025-21991 kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
  • BZ - 2360099 - CVE-2025-22020 kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
  • BZ - 2363378 - CVE-2022-49788 kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
  • BZ - 2363672 - CVE-2025-37797 kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling
  • BZ - 2373605 - CVE-2022-50200 kernel: selinux: Add boundary check in put_entry()
  • BZ - 2375305 - CVE-2025-38086 kernel: net: ch9200: fix uninitialised access during mii_nway_restart

CVEs

  • CVE-2022-49788
  • CVE-2022-50200
  • CVE-2024-58002
  • CVE-2025-21727
  • CVE-2025-21928
  • CVE-2025-21991
  • CVE-2025-22020
  • CVE-2025-37797
  • CVE-2025-38086

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kernel-rt-5.14.0-284.130.1.rt14.415.el9_2.src.rpm SHA-256: 6865303df9c02701fee4c56dd3fee7ec14f2bbc92e2d3578ca3e07751eba6401
x86_64
kernel-rt-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: c975590ad9afaf6a3fec221789114090a8570f2abe1a4b22a6b11e6e36cc3403
kernel-rt-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: c975590ad9afaf6a3fec221789114090a8570f2abe1a4b22a6b11e6e36cc3403
kernel-rt-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 1d809cb8deac6775136ce972146c2f02401710eb6a01add2d99ee147cfb8785e
kernel-rt-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 1d809cb8deac6775136ce972146c2f02401710eb6a01add2d99ee147cfb8785e
kernel-rt-debug-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 97291998baccca4d6d540014d101a3002db20e2ffb7e4d6fcf7cdc690e5349c0
kernel-rt-debug-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 97291998baccca4d6d540014d101a3002db20e2ffb7e4d6fcf7cdc690e5349c0
kernel-rt-debug-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: ca3d03d7de9b9d8b8ffaa8344804b7577fbca918eb367008baeec1d630b05eb5
kernel-rt-debug-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: ca3d03d7de9b9d8b8ffaa8344804b7577fbca918eb367008baeec1d630b05eb5
kernel-rt-debug-debuginfo-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: a0083d95be6ab23a15b7108dba0654603f0c0b1f6c49357a64cb4731d0412a1b
kernel-rt-debug-debuginfo-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: a0083d95be6ab23a15b7108dba0654603f0c0b1f6c49357a64cb4731d0412a1b
kernel-rt-debug-devel-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 9923b163115e53d682567753ba73fd78faa878b5949360edd7047b78c6c3c51e
kernel-rt-debug-devel-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 9923b163115e53d682567753ba73fd78faa878b5949360edd7047b78c6c3c51e
kernel-rt-debug-kvm-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: d9bdb3b2721c9b08a9f2e3719c2fba9768a71e42db68fbedb49d6a778271b472
kernel-rt-debug-modules-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: f60177de4e74d0fc5fbe0f4406dfad2b2242875d56114d75020e7f6dbe7becac
kernel-rt-debug-modules-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: f60177de4e74d0fc5fbe0f4406dfad2b2242875d56114d75020e7f6dbe7becac
kernel-rt-debug-modules-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 1352b13f4d6d9d2f1aed5123a81f79f784509aa2f998183717f9fa0d89cac09b
kernel-rt-debug-modules-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 1352b13f4d6d9d2f1aed5123a81f79f784509aa2f998183717f9fa0d89cac09b
kernel-rt-debug-modules-extra-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: faf7fc61730bf66e02e33676032b52064afb7150eedcdb081b6b6fd9e3689618
kernel-rt-debug-modules-extra-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: faf7fc61730bf66e02e33676032b52064afb7150eedcdb081b6b6fd9e3689618
kernel-rt-debuginfo-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 719e7212c9ab9e54d68e1e47d59dc378f897f46c191191b3d66addedd4c88822
kernel-rt-debuginfo-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 719e7212c9ab9e54d68e1e47d59dc378f897f46c191191b3d66addedd4c88822
kernel-rt-debuginfo-common-x86_64-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: cd008b1e388d21cec8ff2df5ab071c814678dd49af4bb22886f00d1e4dc3776c
kernel-rt-debuginfo-common-x86_64-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: cd008b1e388d21cec8ff2df5ab071c814678dd49af4bb22886f00d1e4dc3776c
kernel-rt-devel-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: c179a39e9b9b7e9bca5281e825f3fdf0f89f413f9e7a0ebc41e5849fc52d3d2e
kernel-rt-devel-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: c179a39e9b9b7e9bca5281e825f3fdf0f89f413f9e7a0ebc41e5849fc52d3d2e
kernel-rt-kvm-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 53cd6527729f861efe1d7b3ebb7bbc413ea55274d98e43286c90523fa43d5308
kernel-rt-modules-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 5e4735296857072301489babf30f641a7c11de156255e659ebeca35edabd12e8
kernel-rt-modules-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 5e4735296857072301489babf30f641a7c11de156255e659ebeca35edabd12e8
kernel-rt-modules-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 084f879d373dbd1efc9863b295cd82d4a8f87cd4e0ec4e53a7a06f7966e03eeb
kernel-rt-modules-core-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: 084f879d373dbd1efc9863b295cd82d4a8f87cd4e0ec4e53a7a06f7966e03eeb
kernel-rt-modules-extra-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: fac607df56cb0099ad31c469aaac4df5d109a3344c7242073edc969b498623ba
kernel-rt-modules-extra-5.14.0-284.130.1.rt14.415.el9_2.x86_64.rpm SHA-256: fac607df56cb0099ad31c469aaac4df5d109a3344c7242073edc969b498623ba

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility