[ALSA-2025:15472] Important: kernel-rt security update
Type:
security
Severity:
important
Release date:
2025-09-09
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: bpf: Don't use tnum_range on array range checking for poke descriptors (CVE-2022-49985) * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-debug-core-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 03a518db94aa9cffeef86d22edc670eb0e13dc3787016601f45ce93657397997
x86_64 kernel-rt-devel-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 13937f8ccc60364c471f4f43f75801a04c4690b820b10f294692443eaf6c5289
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 311d431725006197599bb6c6633215252f5606ac5e15807e829512ff2d469b54
x86_64 kernel-rt-modules-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 57f1532323a51441c8bbcc17912f26ebff7b309c3e5eadbffeff7e2250f2641b
x86_64 kernel-rt-debug-modules-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 5a31ae846e41c2fbd328952f40bb85e5b91c625381434b362b911c232068dc6d
x86_64 kernel-rt-modules-extra-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 6d65fef8cdc8141bd887db002554c83949d988496f11bb6fca9d23dd4bf3fbfa
x86_64 kernel-rt-debug-devel-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm 8875abac402822801dc6fa9ef19996b4d9140725c5e4d4a81a8d23d7295724de
x86_64 kernel-rt-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm be424f9077cedef064acaa080e28800eebb06a16a257a3eb1bcc15a1ff8e3e2a
x86_64 kernel-rt-debug-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm f869ef60cc5e9862e6eb7fbc216c884539de6d54f99c7e7b5ade729e45472ba6
x86_64 kernel-rt-core-4.18.0-553.74.1.rt7.415.el8_10.x86_64.rpm f8a74501765f923074a647c8d7ca0e1d0c9fdd30c0c41733266a2877d3339932
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.