Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:22997 - Security Advisory
Issued:
2025-12-10
Updated:
2025-12-10

RHSA-2025:22997 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610)
  • kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)
  • kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64

Fixes

  • BZ - 2270080 - CVE-2023-52610 kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
  • BZ - 2396944 - CVE-2025-39841 kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path
  • BZ - 2397553 - CVE-2025-39883 kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory

CVEs

  • CVE-2023-52610
  • CVE-2025-39841
  • CVE-2025-39883

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM
kernel-rt-5.14.0-70.157.1.rt21.229.el9_0.src.rpm SHA-256: ca65f6cdfb06448bbbf0df7ab08e38fe4e18180129521b391555ab56fae5ea54
x86_64
kernel-rt-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: cb80a919853dd2e41a82ffe481309b2438990140c8d66c8dca22c54dae31186c
kernel-rt-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: cb80a919853dd2e41a82ffe481309b2438990140c8d66c8dca22c54dae31186c
kernel-rt-core-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 191e4a0e80c1d771406af43ff1eba147d3b70742bc87cea068955d626f15def0
kernel-rt-core-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 191e4a0e80c1d771406af43ff1eba147d3b70742bc87cea068955d626f15def0
kernel-rt-debug-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 929bd4732eb73f2b82cc2baa4fcc309711ea590847d497b6db5475f49fda6555
kernel-rt-debug-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 929bd4732eb73f2b82cc2baa4fcc309711ea590847d497b6db5475f49fda6555
kernel-rt-debug-core-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 14afd662e5f427d407535aa509669a6da65c6ccdb1de98bdc4411b9402fd2ffc
kernel-rt-debug-core-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 14afd662e5f427d407535aa509669a6da65c6ccdb1de98bdc4411b9402fd2ffc
kernel-rt-debug-debuginfo-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 94de14a003fcedd39d8a5cfda7c744197e0fd0f8066c8904e30f46c2b59192c0
kernel-rt-debug-debuginfo-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 94de14a003fcedd39d8a5cfda7c744197e0fd0f8066c8904e30f46c2b59192c0
kernel-rt-debug-devel-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: cbccc0f650850b8ea761b6fda4bf93054488b709cfcef68bd44c56fdb652f293
kernel-rt-debug-devel-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: cbccc0f650850b8ea761b6fda4bf93054488b709cfcef68bd44c56fdb652f293
kernel-rt-debug-kvm-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 22a6f7db59cb528872a6c5cc09cc7b991dc3ad810a1debb866cb32885a94bac9
kernel-rt-debug-modules-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: edb45de3aee224e7f45c8ccd2c9b72938f6cb29e0d30b1adeeef2e2d3f692004
kernel-rt-debug-modules-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: edb45de3aee224e7f45c8ccd2c9b72938f6cb29e0d30b1adeeef2e2d3f692004
kernel-rt-debug-modules-extra-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: a974d43dd627d932c9a6ed6ef44bed6e476cc30a71ff89f33cd09f66b13d114e
kernel-rt-debug-modules-extra-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: a974d43dd627d932c9a6ed6ef44bed6e476cc30a71ff89f33cd09f66b13d114e
kernel-rt-debuginfo-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 77a910c7a771d3d25c81b95c5e2c34fbbe19209f51c1119a3167c27c5667c4f4
kernel-rt-debuginfo-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 77a910c7a771d3d25c81b95c5e2c34fbbe19209f51c1119a3167c27c5667c4f4
kernel-rt-debuginfo-common-x86_64-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: fc84db38c57f69cd16491792afdd07c33bedcf5411e6ea6e7472942f7519f822
kernel-rt-debuginfo-common-x86_64-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: fc84db38c57f69cd16491792afdd07c33bedcf5411e6ea6e7472942f7519f822
kernel-rt-devel-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: bafe1169a21369c1a309c3f8b389bd70fcf50e831028bcb6d33dd9fdd8118c61
kernel-rt-devel-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: bafe1169a21369c1a309c3f8b389bd70fcf50e831028bcb6d33dd9fdd8118c61
kernel-rt-kvm-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: e6522b76a17800a6e65e041aa7d43c045a0a5c6dd2410435940cfb26f2b6b44c
kernel-rt-modules-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 529fe61c9f9f946056a481a776557317907e6c48971baa7d979db1e077e70a7f
kernel-rt-modules-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 529fe61c9f9f946056a481a776557317907e6c48971baa7d979db1e077e70a7f
kernel-rt-modules-extra-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 810d78a2342d89d16d860ed2f5554fcb163afa6c4b71c7ff075bc8d09b4be545
kernel-rt-modules-extra-5.14.0-70.157.1.rt21.229.el9_0.x86_64.rpm SHA-256: 810d78a2342d89d16d860ed2f5554fcb163afa6c4b71c7ff075bc8d09b4be545

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility