Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:21128 - Security Advisory
Issued:
2025-11-12
Updated:
2025-11-12

RHSA-2025:21128 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
  • kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697)
  • kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (CVE-2023-53213)
  • kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes (CVE-2023-53185)
  • kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data (CVE-2023-53232)
  • kernel: mm: fix zswap writeback race condition (CVE-2023-53178)
  • kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets (CVE-2023-53226)
  • kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305)
  • kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)
  • kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy (CVE-2022-50367)
  • kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails (CVE-2022-50356)
  • kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
  • kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401)
  • kernel: Bluetooth: Fix potential use-after-free when clear keys (CVE-2023-53386)
  • kernel: iomap: iomap: fix memory corruption when recording errors during writeback (CVE-2022-50406)
  • kernel: crypto: xts - Handle EBUSY correctly (CVE-2023-53494)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2389491 - CVE-2025-38614 kernel: eventpoll: Fix semi-unbounded recursion
  • BZ - 2393481 - CVE-2025-39697 kernel: NFS: Fix a race when updating an existing write
  • BZ - 2395267 - CVE-2023-53213 kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
  • BZ - 2395297 - CVE-2023-53185 kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
  • BZ - 2395322 - CVE-2023-53232 kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data
  • BZ - 2395358 - CVE-2023-53178 kernel: mm: fix zswap writeback race condition
  • BZ - 2395420 - CVE-2023-53226 kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets
  • BZ - 2395858 - CVE-2023-53305 kernel: Bluetooth: L2CAP: Fix use-after-free
  • BZ - 2395880 - CVE-2023-53331 kernel: pstore/ram: Check start of empty przs during init
  • BZ - 2396114 - CVE-2022-50367 kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy
  • BZ - 2396152 - CVE-2022-50356 kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails
  • BZ - 2396379 - CVE-2023-53373 kernel: crypto: seqiv - Handle EBUSY correctly
  • BZ - 2396417 - CVE-2023-53401 kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
  • BZ - 2396419 - CVE-2023-53386 kernel: Bluetooth: Fix potential use-after-free when clear keys
  • BZ - 2396538 - CVE-2022-50406 kernel: iomap: iomap: fix memory corruption when recording errors during writeback
  • BZ - 2400777 - CVE-2023-53494 kernel: crypto: xts - Handle EBUSY correctly

CVEs

  • CVE-2022-50356
  • CVE-2022-50367
  • CVE-2022-50406
  • CVE-2023-53178
  • CVE-2023-53185
  • CVE-2023-53213
  • CVE-2023-53226
  • CVE-2023-53232
  • CVE-2023-53305
  • CVE-2023-53331
  • CVE-2023-53373
  • CVE-2023-53386
  • CVE-2023-53401
  • CVE-2023-53494
  • CVE-2025-38614
  • CVE-2025-39697

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kernel-rt-5.14.0-284.146.1.rt14.431.el9_2.src.rpm SHA-256: 819e8bbd3e92105299b73df572ffecd4b0e03202021f6fd3f48ec8fecb658c8c
x86_64
kernel-rt-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 71d70bf669192439c3f324ac5830f96afb88beaf0d129448d55870d7e4f1e426
kernel-rt-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 71d70bf669192439c3f324ac5830f96afb88beaf0d129448d55870d7e4f1e426
kernel-rt-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 845d91694048a6291b7c8ebd66206d66c57aa95af718e23990575780f372cfac
kernel-rt-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 845d91694048a6291b7c8ebd66206d66c57aa95af718e23990575780f372cfac
kernel-rt-debug-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 489fd1c9f0c6bcc5e8bbbc83a47200a62c495d78ef68b3c8a1029bee6f0b7773
kernel-rt-debug-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 489fd1c9f0c6bcc5e8bbbc83a47200a62c495d78ef68b3c8a1029bee6f0b7773
kernel-rt-debug-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: a0524e7c2c0a3897d7ee241856a1b00c800b9a52ce37579f74b707ae0a23f85a
kernel-rt-debug-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: a0524e7c2c0a3897d7ee241856a1b00c800b9a52ce37579f74b707ae0a23f85a
kernel-rt-debug-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: d17f154b610fe7f40c0b9ae03fd85f94263e328feeca6725ed3be33eea590301
kernel-rt-debug-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: d17f154b610fe7f40c0b9ae03fd85f94263e328feeca6725ed3be33eea590301
kernel-rt-debug-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 78410a4da817e87150ca390d7535f1aa289c673ee3c619a2b982e68562d8e57b
kernel-rt-debug-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 78410a4da817e87150ca390d7535f1aa289c673ee3c619a2b982e68562d8e57b
kernel-rt-debug-kvm-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: a462f353b1b1c1e48c10f7cd90450e9b86032372a50df47380197ae7b6522dd7
kernel-rt-debug-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 7387f3d271d1b69779a96e4e0be2890e7a59bf98f456a85695c08536b4bc26f7
kernel-rt-debug-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 7387f3d271d1b69779a96e4e0be2890e7a59bf98f456a85695c08536b4bc26f7
kernel-rt-debug-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 72728c56ab880555d6b985fcf82718ff30ae9e693d9bd503a7e93614232b06da
kernel-rt-debug-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 72728c56ab880555d6b985fcf82718ff30ae9e693d9bd503a7e93614232b06da
kernel-rt-debug-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: e1856d4c1b04e1864caa2dd27b702c1a075cf43c7c682e34682fe7ce606a630f
kernel-rt-debug-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: e1856d4c1b04e1864caa2dd27b702c1a075cf43c7c682e34682fe7ce606a630f
kernel-rt-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: aff30f3683f86d5bea4237f9cdb60ccd97950a73e6dce022a68c37699225c790
kernel-rt-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: aff30f3683f86d5bea4237f9cdb60ccd97950a73e6dce022a68c37699225c790
kernel-rt-debuginfo-common-x86_64-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: a46f6e8118c59c4f0275e2a518e0a47224a1fd0de9e65c3009cb0a67bda63dae
kernel-rt-debuginfo-common-x86_64-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: a46f6e8118c59c4f0275e2a518e0a47224a1fd0de9e65c3009cb0a67bda63dae
kernel-rt-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 4a1dd053b1cfe09b0065c86c043b754557902c95d3cdb7eaf299cbf39018e3ca
kernel-rt-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 4a1dd053b1cfe09b0065c86c043b754557902c95d3cdb7eaf299cbf39018e3ca
kernel-rt-kvm-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 7e6b776a3273410e8eee988f3319adbddc6716cee1ff479a9755d667d56f7726
kernel-rt-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 0df893d7cf434e978f34eaf05a125dbd57d4d7c12cc0523083d6f953c7f11220
kernel-rt-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 0df893d7cf434e978f34eaf05a125dbd57d4d7c12cc0523083d6f953c7f11220
kernel-rt-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 0e73415b724c702b7f943a8cca2fe8f289a6ed1ecffc3ec39a1cbf9707fcda19
kernel-rt-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 0e73415b724c702b7f943a8cca2fe8f289a6ed1ecffc3ec39a1cbf9707fcda19
kernel-rt-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 6839811858a3542b5891eac053b2f7772dd5fc50d157d8e9aaa760eed01f755b
kernel-rt-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm SHA-256: 6839811858a3542b5891eac053b2f7772dd5fc50d157d8e9aaa760eed01f755b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility