- Issued:
- 2025-11-12
- Updated:
- 2025-11-12
RHSA-2025:21128 - Security Advisory
Synopsis
Moderate: kernel-rt security update
Type/Severity
Security Advisory: Moderate
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
- kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697)
- kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (CVE-2023-53213)
- kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes (CVE-2023-53185)
- kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data (CVE-2023-53232)
- kernel: mm: fix zswap writeback race condition (CVE-2023-53178)
- kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets (CVE-2023-53226)
- kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305)
- kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)
- kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy (CVE-2022-50367)
- kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails (CVE-2022-50356)
- kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
- kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401)
- kernel: Bluetooth: Fix potential use-after-free when clear keys (CVE-2023-53386)
- kernel: iomap: iomap: fix memory corruption when recording errors during writeback (CVE-2022-50406)
- kernel: crypto: xts - Handle EBUSY correctly (CVE-2023-53494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
Fixes
- BZ - 2389491 - CVE-2025-38614 kernel: eventpoll: Fix semi-unbounded recursion
- BZ - 2393481 - CVE-2025-39697 kernel: NFS: Fix a race when updating an existing write
- BZ - 2395267 - CVE-2023-53213 kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- BZ - 2395297 - CVE-2023-53185 kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
- BZ - 2395322 - CVE-2023-53232 kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data
- BZ - 2395358 - CVE-2023-53178 kernel: mm: fix zswap writeback race condition
- BZ - 2395420 - CVE-2023-53226 kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets
- BZ - 2395858 - CVE-2023-53305 kernel: Bluetooth: L2CAP: Fix use-after-free
- BZ - 2395880 - CVE-2023-53331 kernel: pstore/ram: Check start of empty przs during init
- BZ - 2396114 - CVE-2022-50367 kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy
- BZ - 2396152 - CVE-2022-50356 kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails
- BZ - 2396379 - CVE-2023-53373 kernel: crypto: seqiv - Handle EBUSY correctly
- BZ - 2396417 - CVE-2023-53401 kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
- BZ - 2396419 - CVE-2023-53386 kernel: Bluetooth: Fix potential use-after-free when clear keys
- BZ - 2396538 - CVE-2022-50406 kernel: iomap: iomap: fix memory corruption when recording errors during writeback
- BZ - 2400777 - CVE-2023-53494 kernel: crypto: xts - Handle EBUSY correctly
CVEs
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2
| SRPM | |
|---|---|
| kernel-rt-5.14.0-284.146.1.rt14.431.el9_2.src.rpm | SHA-256: 819e8bbd3e92105299b73df572ffecd4b0e03202021f6fd3f48ec8fecb658c8c |
| x86_64 | |
| kernel-rt-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 71d70bf669192439c3f324ac5830f96afb88beaf0d129448d55870d7e4f1e426 |
| kernel-rt-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 71d70bf669192439c3f324ac5830f96afb88beaf0d129448d55870d7e4f1e426 |
| kernel-rt-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 845d91694048a6291b7c8ebd66206d66c57aa95af718e23990575780f372cfac |
| kernel-rt-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 845d91694048a6291b7c8ebd66206d66c57aa95af718e23990575780f372cfac |
| kernel-rt-debug-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 489fd1c9f0c6bcc5e8bbbc83a47200a62c495d78ef68b3c8a1029bee6f0b7773 |
| kernel-rt-debug-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 489fd1c9f0c6bcc5e8bbbc83a47200a62c495d78ef68b3c8a1029bee6f0b7773 |
| kernel-rt-debug-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: a0524e7c2c0a3897d7ee241856a1b00c800b9a52ce37579f74b707ae0a23f85a |
| kernel-rt-debug-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: a0524e7c2c0a3897d7ee241856a1b00c800b9a52ce37579f74b707ae0a23f85a |
| kernel-rt-debug-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: d17f154b610fe7f40c0b9ae03fd85f94263e328feeca6725ed3be33eea590301 |
| kernel-rt-debug-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: d17f154b610fe7f40c0b9ae03fd85f94263e328feeca6725ed3be33eea590301 |
| kernel-rt-debug-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 78410a4da817e87150ca390d7535f1aa289c673ee3c619a2b982e68562d8e57b |
| kernel-rt-debug-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 78410a4da817e87150ca390d7535f1aa289c673ee3c619a2b982e68562d8e57b |
| kernel-rt-debug-kvm-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: a462f353b1b1c1e48c10f7cd90450e9b86032372a50df47380197ae7b6522dd7 |
| kernel-rt-debug-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 7387f3d271d1b69779a96e4e0be2890e7a59bf98f456a85695c08536b4bc26f7 |
| kernel-rt-debug-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 7387f3d271d1b69779a96e4e0be2890e7a59bf98f456a85695c08536b4bc26f7 |
| kernel-rt-debug-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 72728c56ab880555d6b985fcf82718ff30ae9e693d9bd503a7e93614232b06da |
| kernel-rt-debug-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 72728c56ab880555d6b985fcf82718ff30ae9e693d9bd503a7e93614232b06da |
| kernel-rt-debug-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: e1856d4c1b04e1864caa2dd27b702c1a075cf43c7c682e34682fe7ce606a630f |
| kernel-rt-debug-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: e1856d4c1b04e1864caa2dd27b702c1a075cf43c7c682e34682fe7ce606a630f |
| kernel-rt-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: aff30f3683f86d5bea4237f9cdb60ccd97950a73e6dce022a68c37699225c790 |
| kernel-rt-debuginfo-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: aff30f3683f86d5bea4237f9cdb60ccd97950a73e6dce022a68c37699225c790 |
| kernel-rt-debuginfo-common-x86_64-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: a46f6e8118c59c4f0275e2a518e0a47224a1fd0de9e65c3009cb0a67bda63dae |
| kernel-rt-debuginfo-common-x86_64-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: a46f6e8118c59c4f0275e2a518e0a47224a1fd0de9e65c3009cb0a67bda63dae |
| kernel-rt-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 4a1dd053b1cfe09b0065c86c043b754557902c95d3cdb7eaf299cbf39018e3ca |
| kernel-rt-devel-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 4a1dd053b1cfe09b0065c86c043b754557902c95d3cdb7eaf299cbf39018e3ca |
| kernel-rt-kvm-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 7e6b776a3273410e8eee988f3319adbddc6716cee1ff479a9755d667d56f7726 |
| kernel-rt-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 0df893d7cf434e978f34eaf05a125dbd57d4d7c12cc0523083d6f953c7f11220 |
| kernel-rt-modules-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 0df893d7cf434e978f34eaf05a125dbd57d4d7c12cc0523083d6f953c7f11220 |
| kernel-rt-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 0e73415b724c702b7f943a8cca2fe8f289a6ed1ecffc3ec39a1cbf9707fcda19 |
| kernel-rt-modules-core-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 0e73415b724c702b7f943a8cca2fe8f289a6ed1ecffc3ec39a1cbf9707fcda19 |
| kernel-rt-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 6839811858a3542b5891eac053b2f7772dd5fc50d157d8e9aaa760eed01f755b |
| kernel-rt-modules-extra-5.14.0-284.146.1.rt14.431.el9_2.x86_64.rpm | SHA-256: 6839811858a3542b5891eac053b2f7772dd5fc50d157d8e9aaa760eed01f755b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.