Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:17896 - Security Advisory
Issued:
2025-10-14
Updated:
2025-10-14

RHSA-2025:17896 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_79_1, and kpatch-patch-5_14_0-284_92_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-284.79.1.el9_2.

Security Fix(es):

  • kernel: skbuff: Fix a race between coalescing and releasing SKBs (CVE-2023-53186)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2395254 - CVE-2023-53186 kernel: skbuff: Fix a race between coalescing and releasing SKBs

CVEs

  • CVE-2023-53186

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-11.el9_2.src.rpm SHA-256: a175eab96d5a7c5392498caf974a7a4c4813e88f3002c920b61e9111333a59c1
kpatch-patch-5_14_0-284_117_1-1-8.el9_2.src.rpm SHA-256: bcb0bf2453c711d48734585c6a2bec1904b63f9ed914bafc3b0c1e0f17f7b30d
kpatch-patch-5_14_0-284_134_1-1-2.el9_2.src.rpm SHA-256: 22504df274ce3f4b79d738ae5a7ce08e096917def5a1238efa08e1298f4de1b6
kpatch-patch-5_14_0-284_79_1-1-15.el9_2.src.rpm SHA-256: e095b0f5e33842f6662ce6d282c2c374a06cce086cf89da18c3ecbe08ba9926d
kpatch-patch-5_14_0-284_92_1-1-13.el9_2.src.rpm SHA-256: b056db2263fcb1bf24d9dd9b67776f643baae6399c413e9d3093a6e4e8ac2684
x86_64
kpatch-patch-5_14_0-284_104_1-1-11.el9_2.x86_64.rpm SHA-256: 6b8800e59e7421530153feda21e39e6d812d567e7b6432b01be0c95689c66a0c
kpatch-patch-5_14_0-284_104_1-debuginfo-1-11.el9_2.x86_64.rpm SHA-256: ac64989945d009477ba84c7e71ccaf356c69d577676cff0a5a995eef01c431f5
kpatch-patch-5_14_0-284_104_1-debugsource-1-11.el9_2.x86_64.rpm SHA-256: 1d0567367b5606766ead24db127385dc25b4ae5fc740ed54d78a82045a7b5c9f
kpatch-patch-5_14_0-284_117_1-1-8.el9_2.x86_64.rpm SHA-256: bd5f4bc0463c4b47420da61da439043062c04e4900d06c80b957cf85a8517801
kpatch-patch-5_14_0-284_117_1-debuginfo-1-8.el9_2.x86_64.rpm SHA-256: aef5e1bef642e9df58b5b2e8b8c826067c3d80c593f25f93b285386ba144ec37
kpatch-patch-5_14_0-284_117_1-debugsource-1-8.el9_2.x86_64.rpm SHA-256: 1068d51828428ebb39f684b2d4697c905f7f9b1c64dfba952254de86547112a6
kpatch-patch-5_14_0-284_134_1-1-2.el9_2.x86_64.rpm SHA-256: 577c14c290ab2000dde67b043cff648e08f1ca049047a9a3ba001bb32c74cefa
kpatch-patch-5_14_0-284_134_1-debuginfo-1-2.el9_2.x86_64.rpm SHA-256: 39604009455e47010b9c82dafd70e657f0378487ebb8dcf15ab94d39087890c3
kpatch-patch-5_14_0-284_134_1-debugsource-1-2.el9_2.x86_64.rpm SHA-256: 5d9d1ec7ec0a42d247ed3845c924ca33ae8166b80e5668a4732553b7d7122d5c
kpatch-patch-5_14_0-284_79_1-1-15.el9_2.x86_64.rpm SHA-256: 5ddb873306639e96ba1569d6803fbd31c24bbb199e050a7f04021960dc064ba6
kpatch-patch-5_14_0-284_79_1-debuginfo-1-15.el9_2.x86_64.rpm SHA-256: 81c65115e1fbcd19ab145bb6c9b6065a64a6aeeb590da53b9e713ee117f8f186
kpatch-patch-5_14_0-284_79_1-debugsource-1-15.el9_2.x86_64.rpm SHA-256: cc117f67132035b757b073f775dd52db8554a2fb454209120707b379733d87cb
kpatch-patch-5_14_0-284_92_1-1-13.el9_2.x86_64.rpm SHA-256: 30d242f0aa029d3f219738eff002595a397fa96c4e8ecbe16430cb94ba811934
kpatch-patch-5_14_0-284_92_1-debuginfo-1-13.el9_2.x86_64.rpm SHA-256: 2b2caf92463000b84f606e28365f887717903cbc560fcd744d846ea583ef27f8
kpatch-patch-5_14_0-284_92_1-debugsource-1-13.el9_2.x86_64.rpm SHA-256: ab8d1970f3d75cfab9a4eec795c3ded80a03094f7b8ee5aa76fc3c954c1f9d4f

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-11.el9_2.src.rpm SHA-256: a175eab96d5a7c5392498caf974a7a4c4813e88f3002c920b61e9111333a59c1
kpatch-patch-5_14_0-284_117_1-1-8.el9_2.src.rpm SHA-256: bcb0bf2453c711d48734585c6a2bec1904b63f9ed914bafc3b0c1e0f17f7b30d
kpatch-patch-5_14_0-284_134_1-1-2.el9_2.src.rpm SHA-256: 22504df274ce3f4b79d738ae5a7ce08e096917def5a1238efa08e1298f4de1b6
kpatch-patch-5_14_0-284_79_1-1-15.el9_2.src.rpm SHA-256: e095b0f5e33842f6662ce6d282c2c374a06cce086cf89da18c3ecbe08ba9926d
kpatch-patch-5_14_0-284_92_1-1-13.el9_2.src.rpm SHA-256: b056db2263fcb1bf24d9dd9b67776f643baae6399c413e9d3093a6e4e8ac2684
ppc64le
kpatch-patch-5_14_0-284_104_1-1-11.el9_2.ppc64le.rpm SHA-256: 550d9c4c023eed1c56ff6c3abcf80cdbfb04b5e04c320a3fc3d00224c394b4d4
kpatch-patch-5_14_0-284_104_1-debuginfo-1-11.el9_2.ppc64le.rpm SHA-256: 749e4b738475eee043cbb2042dfb31aa94a972916f45d5918961aace0fab3e36
kpatch-patch-5_14_0-284_104_1-debugsource-1-11.el9_2.ppc64le.rpm SHA-256: f60631c97eb7e09802bf9afbdf9a356dfaeb6d91e3d6fb8951c0dd8e48ecef0c
kpatch-patch-5_14_0-284_117_1-1-8.el9_2.ppc64le.rpm SHA-256: a6143f02db1af01cb17c58ffd52289ffe01c8e77568f7862f7eaf4c4ba5d742f
kpatch-patch-5_14_0-284_117_1-debuginfo-1-8.el9_2.ppc64le.rpm SHA-256: aac34c2170c90fcef11e820b3bbec8da6e2d91b317c34700f2160fc19b312fee
kpatch-patch-5_14_0-284_117_1-debugsource-1-8.el9_2.ppc64le.rpm SHA-256: 79fea007b0f771b89be6b60c644430919a49d377c19450079cd131418785832d
kpatch-patch-5_14_0-284_134_1-1-2.el9_2.ppc64le.rpm SHA-256: d388d273fff1a1b17b5470f6be30fbcf1567f1ffa9fae5920f66e80519222f26
kpatch-patch-5_14_0-284_134_1-debuginfo-1-2.el9_2.ppc64le.rpm SHA-256: 2a1fa4656f7f3b25c2a242736e62fe55cc2e58ed03516b4b78bee4cfb218878a
kpatch-patch-5_14_0-284_134_1-debugsource-1-2.el9_2.ppc64le.rpm SHA-256: 7721556bdef302762f0b3250ca718cbe331148be8c83ad3cb4e2096fb2a7f89c
kpatch-patch-5_14_0-284_79_1-1-15.el9_2.ppc64le.rpm SHA-256: a751205a5586baa350adb3e527106ab0c9e5651b1c08482e5e33bd7b562070e7
kpatch-patch-5_14_0-284_79_1-debuginfo-1-15.el9_2.ppc64le.rpm SHA-256: 0194db45335b9813ec1887e66940a02b4a6e98e5d4940e0c68f22381b41c0259
kpatch-patch-5_14_0-284_79_1-debugsource-1-15.el9_2.ppc64le.rpm SHA-256: c2d1615ba65cb97245e20a187c89b23aabdbf7028a1a8a0cef60ba79be960bd4
kpatch-patch-5_14_0-284_92_1-1-13.el9_2.ppc64le.rpm SHA-256: 0dd4c91f124b08aeaceb0748d655cd7b81430afa6bed50c3f843f963b61c4ebb
kpatch-patch-5_14_0-284_92_1-debuginfo-1-13.el9_2.ppc64le.rpm SHA-256: e3fa1c441139fa56d7d1381dbd8ca8f441d14253b1f496e182104a2741a90121
kpatch-patch-5_14_0-284_92_1-debugsource-1-13.el9_2.ppc64le.rpm SHA-256: 8f90e925058e1049983dc5ab4f244e60f66aeb02427aad36a88fef15cab073e4

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-11.el9_2.src.rpm SHA-256: a175eab96d5a7c5392498caf974a7a4c4813e88f3002c920b61e9111333a59c1
kpatch-patch-5_14_0-284_117_1-1-8.el9_2.src.rpm SHA-256: bcb0bf2453c711d48734585c6a2bec1904b63f9ed914bafc3b0c1e0f17f7b30d
kpatch-patch-5_14_0-284_134_1-1-2.el9_2.src.rpm SHA-256: 22504df274ce3f4b79d738ae5a7ce08e096917def5a1238efa08e1298f4de1b6
kpatch-patch-5_14_0-284_79_1-1-15.el9_2.src.rpm SHA-256: e095b0f5e33842f6662ce6d282c2c374a06cce086cf89da18c3ecbe08ba9926d
kpatch-patch-5_14_0-284_92_1-1-13.el9_2.src.rpm SHA-256: b056db2263fcb1bf24d9dd9b67776f643baae6399c413e9d3093a6e4e8ac2684
x86_64
kpatch-patch-5_14_0-284_104_1-1-11.el9_2.x86_64.rpm SHA-256: 6b8800e59e7421530153feda21e39e6d812d567e7b6432b01be0c95689c66a0c
kpatch-patch-5_14_0-284_104_1-debuginfo-1-11.el9_2.x86_64.rpm SHA-256: ac64989945d009477ba84c7e71ccaf356c69d577676cff0a5a995eef01c431f5
kpatch-patch-5_14_0-284_104_1-debugsource-1-11.el9_2.x86_64.rpm SHA-256: 1d0567367b5606766ead24db127385dc25b4ae5fc740ed54d78a82045a7b5c9f
kpatch-patch-5_14_0-284_117_1-1-8.el9_2.x86_64.rpm SHA-256: bd5f4bc0463c4b47420da61da439043062c04e4900d06c80b957cf85a8517801
kpatch-patch-5_14_0-284_117_1-debuginfo-1-8.el9_2.x86_64.rpm SHA-256: aef5e1bef642e9df58b5b2e8b8c826067c3d80c593f25f93b285386ba144ec37
kpatch-patch-5_14_0-284_117_1-debugsource-1-8.el9_2.x86_64.rpm SHA-256: 1068d51828428ebb39f684b2d4697c905f7f9b1c64dfba952254de86547112a6
kpatch-patch-5_14_0-284_134_1-1-2.el9_2.x86_64.rpm SHA-256: 577c14c290ab2000dde67b043cff648e08f1ca049047a9a3ba001bb32c74cefa
kpatch-patch-5_14_0-284_134_1-debuginfo-1-2.el9_2.x86_64.rpm SHA-256: 39604009455e47010b9c82dafd70e657f0378487ebb8dcf15ab94d39087890c3
kpatch-patch-5_14_0-284_134_1-debugsource-1-2.el9_2.x86_64.rpm SHA-256: 5d9d1ec7ec0a42d247ed3845c924ca33ae8166b80e5668a4732553b7d7122d5c
kpatch-patch-5_14_0-284_79_1-1-15.el9_2.x86_64.rpm SHA-256: 5ddb873306639e96ba1569d6803fbd31c24bbb199e050a7f04021960dc064ba6
kpatch-patch-5_14_0-284_79_1-debuginfo-1-15.el9_2.x86_64.rpm SHA-256: 81c65115e1fbcd19ab145bb6c9b6065a64a6aeeb590da53b9e713ee117f8f186
kpatch-patch-5_14_0-284_79_1-debugsource-1-15.el9_2.x86_64.rpm SHA-256: cc117f67132035b757b073f775dd52db8554a2fb454209120707b379733d87cb
kpatch-patch-5_14_0-284_92_1-1-13.el9_2.x86_64.rpm SHA-256: 30d242f0aa029d3f219738eff002595a397fa96c4e8ecbe16430cb94ba811934
kpatch-patch-5_14_0-284_92_1-debuginfo-1-13.el9_2.x86_64.rpm SHA-256: 2b2caf92463000b84f606e28365f887717903cbc560fcd744d846ea583ef27f8
kpatch-patch-5_14_0-284_92_1-debugsource-1-13.el9_2.x86_64.rpm SHA-256: ab8d1970f3d75cfab9a4eec795c3ded80a03094f7b8ee5aa76fc3c954c1f9d4f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility