[ALSA-2025:17812] Moderate: kernel-rt security update
Type:
security
Severity:
moderate
Release date:
2025-10-14
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 (CVE-2022-50228) * kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm 1a3a2e83cafadbeeebde21d6b100f95e5c2f74b88319aac8ed4447a6307e1e20
x86_64 kernel-rt-debug-modules-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm 41c09f5b51b7ce5df574975e01810e8dbba5357229295e2b203975626e23f051
x86_64 kernel-rt-debug-core-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm 6ae2b5fe82fe54a59aee54e63fdf58ad36c3ca2636b51249a6719e40513bc935
x86_64 kernel-rt-core-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm 95dae926b6eae84176661e09a77bcc3a20f42a19009bc55b15bc7bb9f3fd0ec1
x86_64 kernel-rt-devel-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm 96804d3eb05ae73309bba1a61d6f08c454f4b2addd1adcd9ef7497b39a0d22b2
x86_64 kernel-rt-debug-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm bf01d9dcfec81e09302c4f2fd99e241c703bcba68370e34d322f0ba390786b29
x86_64 kernel-rt-modules-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm c8fd7d8aff680b21f8b7d785fd167231a4291f5f32f3fb85e7f88c40e3271258
x86_64 kernel-rt-modules-extra-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm d6aba5d431c3dc49337d4dd6d6c9ca75c7645e933e47a91de18d17a4a6ca56d0
x86_64 kernel-rt-debug-devel-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm fac7716a1ddef9ca703dbbcb5b1070c7509d67bdbd64e92e720f36cafc1bf28c
x86_64 kernel-rt-4.18.0-553.79.1.rt7.420.el8_10.x86_64.rpm ff1729c0044c29e7bdf45475a34f3c694058352e45513a536a6fc5ae3d62371f
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.