[ALSA-2025:22800] Moderate: kernel-rt security update
Type:
security
Severity:
moderate
Release date:
2025-12-08
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401) * kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539) * kernel: RDMA/rxe: Fix mr->map double free (CVE-2022-50543) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-modules-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm 375ca7e45cc1a8a312fb4d1bb7354b14cec2b18f67dd86d3227be75aa94346aa
x86_64 kernel-rt-debug-devel-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm 55b8deb263f80a7232ab48c7678c2538259a0339954944170f9511bb31bd588d
x86_64 kernel-rt-core-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm 8046907161ff68a5d289d51e28a5b14aa4dcb719f65ba72e0541eaa36bca0afd
x86_64 kernel-rt-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm 912474409f318ebe04f248707a12ff0d1d1e1f23a223e8d8d21bf88d44b43f3b
x86_64 kernel-rt-debug-modules-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm a4b94ba3c0034f544bb90ab6e886aff300b1d214a43ed3daa4c572c319ec6694
x86_64 kernel-rt-debug-core-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm a727d839f031615c5bbc2b86bf9cc23fca6b04b309ee4a8cddc34c7961d10adf
x86_64 kernel-rt-modules-extra-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm acd5863df8305efce1d5f4e19a810c355ec803ee3d331e949f8a7252673d6944
x86_64 kernel-rt-devel-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm cfa8f08388a10d197d1cc84a20bf345897d69d9d400935b0f2bddd5525a4005e
x86_64 kernel-rt-debug-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm d8540964ec5c7b05d61a4ded1a7a73c5c5a9639bde7869ef7b9558778c03125a
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.89.1.rt7.430.el8_10.x86_64.rpm ec1a9e5c02881e8dd4f003a3d2d916336a2701fd0e67c3cc53a8db00ad6356bd
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.