Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:22800 - Security Advisory
Issued:
2025-12-08
Updated:
2025-12-08

RHSA-2025:22800 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401)
  • kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)
  • kernel: RDMA/rxe: Fix mr->map double free (CVE-2022-50543)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 8 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 8 x86_64

Fixes

  • BZ - 2396417 - CVE-2023-53401 kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
  • BZ - 2401510 - CVE-2023-53539 kernel: RDMA/rxe: Fix incomplete state save in rxe_requester
  • BZ - 2402222 - CVE-2022-50543 kernel: RDMA/rxe: Fix mr->map double free

CVEs

  • CVE-2022-50543
  • CVE-2023-53401
  • CVE-2023-53539

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 8

SRPM
kernel-rt-4.18.0-553.89.1.rt7.430.el8_10.src.rpm SHA-256: 268464bcceb3deadf6472d757b0e4f37e8b32ad66d972c3f38015127ddf9c000
x86_64
kernel-rt-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 38df5d65cd85b49e55ac1ccc5eed03b498929fc0d6371dc70c9db5b23c36dece
kernel-rt-core-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 230539fc51e9130a11b1ef7f3b18828cc956ab1e49d3069346bc25e7005c703c
kernel-rt-debug-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 2fedb3a606e5e589e49edd3b31b1983d59c5edad16fc9d36a6c5855530fa8cbd
kernel-rt-debug-core-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 774ba2cf1a2e9afe0fbd6932681f7d23321ef9b8e0a99354125202f9495d9c1c
kernel-rt-debug-debuginfo-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 785bad7fc79668442761a0227252467e49aaed85cae66d45d1dfa29a842ab076
kernel-rt-debug-devel-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 8571d6b0de444920ba5983e7d9d6f0003ba9b4af796c633fd7219c2f99ec58b5
kernel-rt-debug-modules-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: d8917d8fc17c2b1d3919bad761c2321049cffae3088073172d5b720ccca1e84e
kernel-rt-debug-modules-extra-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: d1aa8b39dfa289b9428939ce424952044ca5e85376c6f7967ee508420014cdb4
kernel-rt-debuginfo-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: ae3aade99b5401acdbd0c1b305434edd959463b04694ec85a148c92b97890cba
kernel-rt-debuginfo-common-x86_64-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: b0ad52b6c8b478b77f27f2feb911157b2e8a7a733c061151c4a58ab9db658ef0
kernel-rt-devel-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 35a97206fa2e2d0571ecb9176dfb5b738e491366346963e44dc02b394cf5b692
kernel-rt-modules-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 1ea25d9e7811920f65c26959813f2eb802149a69d392d8c016f192b7ef0d659b
kernel-rt-modules-extra-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: ef3640786dc486f38fea4c897b7d39a4915639596bbe7cf2cc520f8afa0ed17b

Red Hat Enterprise Linux for Real Time for NFV 8

SRPM
kernel-rt-4.18.0-553.89.1.rt7.430.el8_10.src.rpm SHA-256: 268464bcceb3deadf6472d757b0e4f37e8b32ad66d972c3f38015127ddf9c000
x86_64
kernel-rt-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 38df5d65cd85b49e55ac1ccc5eed03b498929fc0d6371dc70c9db5b23c36dece
kernel-rt-core-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 230539fc51e9130a11b1ef7f3b18828cc956ab1e49d3069346bc25e7005c703c
kernel-rt-debug-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 2fedb3a606e5e589e49edd3b31b1983d59c5edad16fc9d36a6c5855530fa8cbd
kernel-rt-debug-core-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 774ba2cf1a2e9afe0fbd6932681f7d23321ef9b8e0a99354125202f9495d9c1c
kernel-rt-debug-debuginfo-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 785bad7fc79668442761a0227252467e49aaed85cae66d45d1dfa29a842ab076
kernel-rt-debug-devel-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 8571d6b0de444920ba5983e7d9d6f0003ba9b4af796c633fd7219c2f99ec58b5
kernel-rt-debug-kvm-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 1ae96e530fb0223ad9c53ff3ff0215ba994965d7f2cf32b2be38bdee688dc261
kernel-rt-debug-modules-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: d8917d8fc17c2b1d3919bad761c2321049cffae3088073172d5b720ccca1e84e
kernel-rt-debug-modules-extra-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: d1aa8b39dfa289b9428939ce424952044ca5e85376c6f7967ee508420014cdb4
kernel-rt-debuginfo-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: ae3aade99b5401acdbd0c1b305434edd959463b04694ec85a148c92b97890cba
kernel-rt-debuginfo-common-x86_64-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: b0ad52b6c8b478b77f27f2feb911157b2e8a7a733c061151c4a58ab9db658ef0
kernel-rt-devel-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 35a97206fa2e2d0571ecb9176dfb5b738e491366346963e44dc02b394cf5b692
kernel-rt-kvm-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: baff0332df8c5185f7f5c03b95dabd75082a9b90a53b9929f485140c049c2aac
kernel-rt-modules-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: 1ea25d9e7811920f65c26959813f2eb802149a69d392d8c016f192b7ef0d659b
kernel-rt-modules-extra-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm SHA-256: ef3640786dc486f38fea4c897b7d39a4915639596bbe7cf2cc520f8afa0ed17b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility