Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:22124 - Security Advisory
Issued:
2025-11-25
Updated:
2025-11-25

RHSA-2025:22124 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610)
  • kernel: smb: client: fix potential UAF in cifs_stats_proc_write() (CVE-2024-35868)
  • kernel: ethtool: check device is present when getting link settings (CVE-2024-46679)
  • kernel: ALSA: usb-audio: Validate UAC3 power domain descriptors, too (CVE-2025-38729)
  • kernel: ipv6: sr: Fix MAC comparison to be constant-time (CVE-2025-39702)
  • kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
  • kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
  • kernel: x86/vmscape: Add conditional IBPB mitigation (CVE-2025-40300)
  • kernel: wifi: mac80211: check S1G action frame size (CVE-2023-53257)
  • kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp (CVE-2023-53297)
  • kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
  • kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (CVE-2023-53365)
  • kernel: Bluetooth: L2CAP: Fix user-after-free (CVE-2022-50386)
  • kernel: nbd: fix incomplete validation of ioctl arg (CVE-2023-53513)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2270080 - CVE-2023-52610 kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
  • BZ - 2281745 - CVE-2024-35868 kernel: smb: client: fix potential UAF in cifs_stats_proc_write()
  • BZ - 2312067 - CVE-2024-46679 kernel: ethtool: check device is present when getting link settings
  • BZ - 2393164 - CVE-2025-38729 kernel: ALSA: usb-audio: Validate UAC3 power domain descriptors, too
  • BZ - 2393533 - CVE-2025-39702 kernel: ipv6: sr: Fix MAC comparison to be constant-time
  • BZ - 2393731 - CVE-2025-39730 kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
  • BZ - 2394615 - CVE-2025-39757 kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors
  • BZ - 2394627 - CVE-2025-40300 kernel: x86/vmscape: Add conditional IBPB mitigation
  • BZ - 2395253 - CVE-2023-53257 kernel: wifi: mac80211: check S1G action frame size
  • BZ - 2395681 - CVE-2023-53297 kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
  • BZ - 2395805 - CVE-2025-39817 kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
  • BZ - 2396130 - CVE-2023-53365 kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report()
  • BZ - 2396431 - CVE-2022-50386 kernel: Bluetooth: L2CAP: Fix user-after-free
  • BZ - 2400795 - CVE-2023-53513 kernel: nbd: fix incomplete validation of ioctl arg

CVEs

  • CVE-2022-50386
  • CVE-2023-52610
  • CVE-2023-53257
  • CVE-2023-53297
  • CVE-2023-53365
  • CVE-2023-53513
  • CVE-2024-35868
  • CVE-2024-46679
  • CVE-2025-38729
  • CVE-2025-39702
  • CVE-2025-39730
  • CVE-2025-39757
  • CVE-2025-39817
  • CVE-2025-40300

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kernel-rt-5.14.0-284.148.1.rt14.433.el9_2.src.rpm SHA-256: 3f6f3e4a7904ed408e9edb0ebc4a1dbe4aa6e9673e54b28390fb43d9adfb0641
x86_64
kernel-rt-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 098cd540b5b96c29090f4cca4262acee1ffbc331deeeb7c275301ac0dc9f5605
kernel-rt-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 098cd540b5b96c29090f4cca4262acee1ffbc331deeeb7c275301ac0dc9f5605
kernel-rt-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 8a9c8fadb3cad55a0ccfa6b63642aed81649500ae8cf25ad45d309ed05724176
kernel-rt-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 8a9c8fadb3cad55a0ccfa6b63642aed81649500ae8cf25ad45d309ed05724176
kernel-rt-debug-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: c141bfd3844bc9e8f425d3618c54123695c249bdf48b1d726ee9711780b54284
kernel-rt-debug-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: c141bfd3844bc9e8f425d3618c54123695c249bdf48b1d726ee9711780b54284
kernel-rt-debug-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 5906ee153d13b5bb3a3a04ba391db0de3f09266adaf097e1f7f638450b6ad412
kernel-rt-debug-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 5906ee153d13b5bb3a3a04ba391db0de3f09266adaf097e1f7f638450b6ad412
kernel-rt-debug-debuginfo-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 189db0eb999199a8f22a6cdf0201850420c9b38cfffe89ca8090a101c9fd6cd4
kernel-rt-debug-debuginfo-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 189db0eb999199a8f22a6cdf0201850420c9b38cfffe89ca8090a101c9fd6cd4
kernel-rt-debug-devel-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: bf6af7515572dec409e546073cea908add30d90ad0d06cb26a126fab612a1b49
kernel-rt-debug-devel-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: bf6af7515572dec409e546073cea908add30d90ad0d06cb26a126fab612a1b49
kernel-rt-debug-kvm-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: cf8b060ca20a682899e53566acfb4e49062bc0d32a1ba56208f67c7a528dbf67
kernel-rt-debug-modules-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 6181821c86b808ffb9e4f3986876839a6ff0d10b54f3c5d4c22e210c77cbb058
kernel-rt-debug-modules-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 6181821c86b808ffb9e4f3986876839a6ff0d10b54f3c5d4c22e210c77cbb058
kernel-rt-debug-modules-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 8eb3f5a6a3fe1cd19c4510cdd3074f5aa56b83037124e48f4892e6e2db2b672f
kernel-rt-debug-modules-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 8eb3f5a6a3fe1cd19c4510cdd3074f5aa56b83037124e48f4892e6e2db2b672f
kernel-rt-debug-modules-extra-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: f9e242973cf2054cbe64c98fac937c46a1bf66719583d659992f36ef4ba1acb0
kernel-rt-debug-modules-extra-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: f9e242973cf2054cbe64c98fac937c46a1bf66719583d659992f36ef4ba1acb0
kernel-rt-debuginfo-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: e60ad9769e31735423ca8df9be58ffe961fceeda25e9bab1bf5554595589ba95
kernel-rt-debuginfo-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: e60ad9769e31735423ca8df9be58ffe961fceeda25e9bab1bf5554595589ba95
kernel-rt-debuginfo-common-x86_64-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 26fc5b6f77a1693794f8b81247c8f90afac58dfc0917c859765ced5751f6eeb3
kernel-rt-debuginfo-common-x86_64-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 26fc5b6f77a1693794f8b81247c8f90afac58dfc0917c859765ced5751f6eeb3
kernel-rt-devel-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: fbd593e75c656bdab3cba4eb4c4795af73da7f2b7e9815d2b9ecbb7d08c1b33e
kernel-rt-devel-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: fbd593e75c656bdab3cba4eb4c4795af73da7f2b7e9815d2b9ecbb7d08c1b33e
kernel-rt-kvm-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 4becf7eeba6dea155bba67d7620bc9355449be1669bb4b56016ed30c3fa91729
kernel-rt-modules-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: abfe12bd7322a267867c8a825221c7cb76933407c4f89224153bbfa918b8169f
kernel-rt-modules-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: abfe12bd7322a267867c8a825221c7cb76933407c4f89224153bbfa918b8169f
kernel-rt-modules-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 111a7b963ca22171b2f342a6720d96e318d1355a4b6d03896b4b5ee5fa46ecfa
kernel-rt-modules-core-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: 111a7b963ca22171b2f342a6720d96e318d1355a4b6d03896b4b5ee5fa46ecfa
kernel-rt-modules-extra-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: dc15d6414a6600217fc2d7d24597fe19253078e94ae5209c3bfb2fd67b33d528
kernel-rt-modules-extra-5.14.0-284.148.1.rt14.433.el9_2.x86_64.rpm SHA-256: dc15d6414a6600217fc2d7d24597fe19253078e94ae5209c3bfb2fd67b33d528

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility