[ALSA-2025:11456] Moderate: kernel-rt security update
Type:
security
Severity:
moderate
Release date:
2025-07-23
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (CVE-2024-50154) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-debug-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 03050f60ca269b28970140045ad5370a34f99ac3ab027ae824909da78bf9280c
x86_64 kernel-rt-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 07eb918f73bfb046a522037b07fe5e43771f98948dde0b2609a3e0230e2a21c5
x86_64 kernel-rt-debug-modules-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 2d700c5226093e259fa3b7064a9b347dcf0463c65a1e378204896a715707b7c0
x86_64 kernel-rt-devel-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 313e1a09e24e033cc667fe89326b1ea26fca32101515f253cb7fe32e1f5c04fc
x86_64 kernel-rt-debug-core-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 59817b2d7d344d1db3a4bdea42b76d251292e305eb75ae2c7f355992f2a69a06
x86_64 kernel-rt-core-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 789ef0c1ddc64644d30d59d5cdb86ae45910d57a5b5e3272e46e552bdc5a7069
x86_64 kernel-rt-modules-extra-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 7cb19227893001b7dcb915d56212780d3102e455618fd42ecffc73fc77818244
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 7d6471bf4783e659a753fb8016ed205e1c95884beb7a04cda3954a7822b4d7db
x86_64 kernel-rt-debug-devel-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 8d98348acf234416f1a4ce755ec17edda6e03f53ac13d19c723a7ce0d8611eaf
x86_64 kernel-rt-modules-4.18.0-553.63.1.rt7.404.el8_10.x86_64.rpm 97ee14c60301c4cae9b6adad4811c93ee4e480596a284d14b9d3765d0f60c9df
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.