RHSA-2025:22914
Vulnerability from csaf_redhat - Published: 2025-12-09 12:20 - Updated: 2025-12-17 20:40Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
* kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)
* kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305)
* kernel: cifs: fix oops during encryption (CVE-2022-50341)
* kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (CVE-2023-53365)
* kernel: Bluetooth: L2CAP: Fix user-after-free (CVE-2022-50386)
* kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (CVE-2022-50408)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)\n\n* kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)\n\n* kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305)\n\n* kernel: cifs: fix oops during encryption (CVE-2022-50341)\n\n* kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (CVE-2023-53365)\n\n* kernel: Bluetooth: L2CAP: Fix user-after-free (CVE-2022-50386)\n\n* kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (CVE-2022-50408)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22914",
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2139610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610"
},
{
"category": "external",
"summary": "2393166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393166"
},
{
"category": "external",
"summary": "2395858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395858"
},
{
"category": "external",
"summary": "2395879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395879"
},
{
"category": "external",
"summary": "2396130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396130"
},
{
"category": "external",
"summary": "2396431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396431"
},
{
"category": "external",
"summary": "2396506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22914.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-12-17T20:40:19+00:00",
"generator": {
"date": "2025-12-17T20:40:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:22914",
"initial_release_date": "2025-12-09T12:20:30+00:00",
"revision_history": [
{
"date": "2025-12-09T12:20:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-09T12:20:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T20:40:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.143.1.rt56.1295.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.143.1.rt56.1295.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.143.1.rt56.1295.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
"product_id": "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"relates_to_product_reference": "7Server-RT-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3640",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2139610"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux Kernel in the l2cap_conn_del in net/bluetooth/l2cap_core.c function in the Bluetooth component. This issue leads to a use-after-free problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "RHBZ#2139610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"
}
],
"release_date": "2022-10-17T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c"
},
{
"cve": "CVE-2022-50341",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix oops during encryption\n\nWhen running xfstests against Azure the following oops occurred on an\narm64 system\n\n Unable to handle kernel write to read-only memory at virtual address\n ffff0001221cf000\n Mem abort info:\n ESR = 0x9600004f\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x0f: level 3 permission fault\n Data abort info:\n ISV = 0, ISS = 0x0000004f\n CM = 0, WnR = 1\n swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000294f3000\n [ffff0001221cf000] pgd=18000001ffff8003, p4d=18000001ffff8003,\n pud=18000001ff82e003, pmd=18000001ff71d003, pte=00600001221cf787\n Internal error: Oops: 9600004f [#1] PREEMPT SMP\n ...\n pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)\n pc : __memcpy+0x40/0x230\n lr : scatterwalk_copychunks+0xe0/0x200\n sp : ffff800014e92de0\n x29: ffff800014e92de0 x28: ffff000114f9de80 x27: 0000000000000008\n x26: 0000000000000008 x25: ffff800014e92e78 x24: 0000000000000008\n x23: 0000000000000001 x22: 0000040000000000 x21: ffff000000000000\n x20: 0000000000000001 x19: ffff0001037c4488 x18: 0000000000000014\n x17: 235e1c0d6efa9661 x16: a435f9576b6edd6c x15: 0000000000000058\n x14: 0000000000000001 x13: 0000000000000008 x12: ffff000114f2e590\n x11: ffffffffffffffff x10: 0000040000000000 x9 : ffff8000105c3580\n x8 : 2e9413b10000001a x7 : 534b4410fb86b005 x6 : 534b4410fb86b005\n x5 : ffff0001221cf008 x4 : ffff0001037c4490 x3 : 0000000000000001\n x2 : 0000000000000008 x1 : ffff0001037c4488 x0 : ffff0001221cf000\n Call trace:\n __memcpy+0x40/0x230\n scatterwalk_map_and_copy+0x98/0x100\n crypto_ccm_encrypt+0x150/0x180\n crypto_aead_encrypt+0x2c/0x40\n crypt_message+0x750/0x880\n smb3_init_transform_rq+0x298/0x340\n smb_send_rqst.part.11+0xd8/0x180\n smb_send_rqst+0x3c/0x100\n compound_send_recv+0x534/0xbc0\n smb2_query_info_compound+0x32c/0x440\n smb2_set_ea+0x438/0x4c0\n cifs_xattr_set+0x5d4/0x7c0\n\nThis is because in scatterwalk_copychunks(), we attempted to write to\na buffer (@sign) that was allocated in the stack (vmalloc area) by\ncrypt_message() and thus accessing its remaining 8 (x2) bytes ended up\ncrossing a page boundary.\n\nTo simply fix it, we could just pass @sign kmalloc\u0027d from\ncrypt_message() and then we\u0027re done. Luckily, we don\u0027t seem to pass\nany other vmalloc\u0027d buffers in smb_rqst::rq_iov...\n\nInstead, let\u0027s map the correct pages and offsets from vmalloc buffers\nas well in cifs_sg_set_buf() and then avoiding such oopses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix oops during encryption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50341"
},
{
"category": "external",
"summary": "RHBZ#2395879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50341"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091638-CVE-2022-50341-12c1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091638-CVE-2022-50341-12c1@gregkh/T"
}
],
"release_date": "2025-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cifs: fix oops during encryption"
},
{
"cve": "CVE-2022-50386",
"discovery_date": "2025-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396431"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix user-after-free\n\nThis uses l2cap_chan_hold_unless_zero() after calling\n__l2cap_get_chan_blah() to prevent the following trace:\n\nBluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref\n*kref)\nBluetooth: chan 0000000023c4974d\nBluetooth: parent 00000000ae861c08\n==================================================================\nBUG: KASAN: use-after-free in __mutex_waiter_is_first\nkernel/locking/mutex.c:191 [inline]\nBUG: KASAN: use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:671 [inline]\nBUG: KASAN: use-after-free in __mutex_lock+0x278/0x400\nkernel/locking/mutex.c:729\nRead of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Bluetooth: L2CAP: Fix user-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A use-after-free in the Bluetooth L2CAP subsystem could occur when handling channel responses in l2cap_connect_create_rsp(), due to missing reference checks. This condition can be triggered during race conditions between channel creation and teardown, leading to kernel crashes. Exploitation is most practical as a local or adjacent denial of service over Bluetooth.\n\nL2CAP underpins many Bluetooth profiles and services (BLE ATT/GATT, RFCOMM, A2DP/AVRCP, HID, PAN, SDP, OBEX, etc.). Any profile that creates logical L2CAP channels may be involved. Common real-world triggers include BLE GATT interactions, audio profiles, HID devices, and tethering/PAN connections.\n\nAn attacker within radio range can attempt to repeatedly open/close or otherwise race L2CAP channels to increase likelihood of the race (fast connect/disconnect storms or parallel requests).\n\nMost realistic impact is a local/adjacent attacker (in Bluetooth radio range) who can actively interact with the target Bluetooth stack.\n\nThe CIA=HHH for CVSS is a conservative/precautionary assessment. In practical terms, successful privilege escalation or remote compromise is unlikely but theoretically possible: to do so an attacker would need to craft a sequence that causes controlled memory corruption and further exploit kernel memory layout \u2014 substantially harder than causing a crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50386"
},
{
"category": "external",
"summary": "RHBZ#2396431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50386"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50386-07d7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50386-07d7@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Bluetooth: L2CAP: Fix user-after-free"
},
{
"cve": "CVE-2022-50408",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396506"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n\n\u003e ret = brcmf_proto_tx_queue_data(drvr, ifp-\u003eifidx, skb);\n\nmay be schedule, and then complete before the line\n\n\u003e ndev-\u003estats.tx_bytes += skb-\u003elen;\n\n[ 46.912801] ==================================================================\n[ 46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[ 46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[ 46.935991]\n[ 46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G O 5.4.199-[REDACTED] #1\n[ 46.947255] Hardware name: [REDACTED]\n[ 46.954568] Call trace:\n[ 46.957037] dump_backtrace+0x0/0x2b8\n[ 46.960719] show_stack+0x24/0x30\n[ 46.964052] dump_stack+0x128/0x194\n[ 46.967557] print_address_description.isra.0+0x64/0x380\n[ 46.972877] __kasan_report+0x1d4/0x240\n[ 46.976723] kasan_report+0xc/0x18\n[ 46.980138] __asan_report_load4_noabort+0x18/0x20\n[ 46.985027] brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[ 46.990613] dev_hard_start_xmit+0x1bc/0xda0\n[ 46.994894] sch_direct_xmit+0x198/0xd08\n[ 46.998827] __qdisc_run+0x37c/0x1dc0\n[ 47.002500] __dev_queue_xmit+0x1528/0x21f8\n[ 47.006692] dev_queue_xmit+0x24/0x30\n[ 47.010366] neigh_resolve_output+0x37c/0x678\n[ 47.014734] ip_finish_output2+0x598/0x2458\n[ 47.018927] __ip_finish_output+0x300/0x730\n[ 47.023118] ip_output+0x2e0/0x430\n[ 47.026530] ip_local_out+0x90/0x140\n[ 47.030117] igmpv3_sendpack+0x14c/0x228\n[ 47.034049] igmpv3_send_cr+0x384/0x6b8\n[ 47.037895] igmp_ifc_timer_expire+0x4c/0x118\n[ 47.042262] call_timer_fn+0x1cc/0xbe8\n[ 47.046021] __run_timers+0x4d8/0xb28\n[ 47.049693] run_timer_softirq+0x24/0x40\n[ 47.053626] __do_softirq+0x2c0/0x117c\n[ 47.057387] irq_exit+0x2dc/0x388\n[ 47.060715] __handle_domain_irq+0xb4/0x158\n[ 47.064908] gic_handle_irq+0x58/0xb0\n[ 47.068581] el0_irq_naked+0x50/0x5c\n[ 47.072162]\n[ 47.073665] Allocated by task 328:\n[ 47.077083] save_stack+0x24/0xb0\n[ 47.080410] __kasan_kmalloc.isra.0+0xc0/0xe0\n[ 47.084776] kasan_slab_alloc+0x14/0x20\n[ 47.088622] kmem_cache_alloc+0x15c/0x468\n[ 47.092643] __alloc_skb+0xa4/0x498\n[ 47.096142] igmpv3_newpack+0x158/0xd78\n[ 47.099987] add_grhead+0x210/0x288\n[ 47.103485] add_grec+0x6b0/0xb70\n[ 47.106811] igmpv3_send_cr+0x2e0/0x6b8\n[ 47.110657] igmp_ifc_timer_expire+0x4c/0x118\n[ 47.115027] call_timer_fn+0x1cc/0xbe8\n[ 47.118785] __run_timers+0x4d8/0xb28\n[ 47.122457] run_timer_softirq+0x24/0x40\n[ 47.126389] __do_softirq+0x2c0/0x117c\n[ 47.130142]\n[ 47.131643] Freed by task 180:\n[ 47.134712] save_stack+0x24/0xb0\n[ 47.138041] __kasan_slab_free+0x108/0x180\n[ 47.142146] kasan_slab_free+0x10/0x18\n[ 47.145904] slab_free_freelist_hook+0xa4/0x1b0\n[ 47.150444] kmem_cache_free+0x8c/0x528\n[ 47.154292] kfree_skbmem+0x94/0x108\n[ 47.157880] consume_skb+0x10c/0x5a8\n[ 47.161466] __dev_kfree_skb_any+0x88/0xa0\n[ 47.165598] brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[ 47.171023] brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[ 47.176016] brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[ 47.182056] brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[ 47.187568] brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[ 47.192529] brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[ 47.197859] process_one_work+0x7fc/0x1a80\n[ 47.201965] worker_thread+0x31c/0xc40\n[ 47.205726] kthread+0x2d8/0x370\n[ 47.208967] ret_from_fork+0x10/0x18\n[ 47.212546]\n[ 47.214051] The buggy address belongs to the object at ffffff803f588280\n[ 47.214051] which belongs to the cache skbuff_head_cache of size 208\n[ 47.227086] The buggy address is located 104 bytes inside of\n[ 47.227086] 208-byte region [ffffff803f588280, ffffff803f588350)\n[ 47.238814] The buggy address belongs to the page:\n[ 47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A Use-After-Free vulnerability was found in brcmf_netdev_start_xmit() in the Broadcom brcmfmac driver.\nThe function updated ndev-\u003estats.tx_bytes after calling brcmf_proto_tx_queue_data(), which may complete asynchronously and free the skb object before accessing it.\nThe patch stores skb-\u003elen in a local variable before the transmission call to prevent dereferencing freed memory.\nPrivilege required is low (PR:L) since the issue is triggered during normal packet transmission from a network interface, accessible to local processes using networking APIs.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50408"
},
{
"category": "external",
"summary": "RHBZ#2396506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50408"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module brcmfmac from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()"
},
{
"cve": "CVE-2023-53305",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395858"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Bluetooth: L2CAP: Fix use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This L2CAP issue is adjacency-only (Bluetooth LE): an attacker must be within radio range and craft malicious LE frames. Impact is primarily kernel crash / DoS.\nIt could trigger a use-after-free condition when processing LE command rejection.\nIn practice an attacker must either establish a BLE connection or rely on the device accepting unauthenticated L2CAP traffic. If the device enforces pairing/authentication for L2CAP operations, exploitation from an unauthenticated remote actor is unlikely.\nFixed in Red Hat Enterprise Linux 9 starting from 9.4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53305"
},
{
"category": "external",
"summary": "RHBZ#2395858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53305"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53305",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53305"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53305-b8fe@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53305-b8fe@gregkh/T"
}
],
"release_date": "2025-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Bluetooth: L2CAP: Fix use-after-free"
},
{
"cve": "CVE-2023-53365",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"discovery_date": "2025-09-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396130"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6mr: Fix skb_under_panic in ip6mr_cache_report()\n\nskbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4\n head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg\n ------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:192!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: ipv6_addrconf addrconf_dad_work\n RIP: 0010:skb_panic+0x152/0x1d0\n Call Trace:\n \u003cTASK\u003e\n skb_push+0xc4/0xe0\n ip6mr_cache_report+0xd69/0x19b0\n reg_vif_xmit+0x406/0x690\n dev_hard_start_xmit+0x17e/0x6e0\n __dev_queue_xmit+0x2d6a/0x3d20\n vlan_dev_hard_start_xmit+0x3ab/0x5c0\n dev_hard_start_xmit+0x17e/0x6e0\n __dev_queue_xmit+0x2d6a/0x3d20\n neigh_connected_output+0x3ed/0x570\n ip6_finish_output2+0x5b5/0x1950\n ip6_finish_output+0x693/0x11c0\n ip6_output+0x24b/0x880\n NF_HOOK.constprop.0+0xfd/0x530\n ndisc_send_skb+0x9db/0x1400\n ndisc_send_rs+0x12a/0x6c0\n addrconf_dad_completed+0x3c9/0xea0\n addrconf_dad_work+0x849/0x1420\n process_one_work+0xa22/0x16e0\n worker_thread+0x679/0x10c0\n ret_from_fork+0x28/0x60\n ret_from_fork_asm+0x11/0x20\n\nWhen setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().\nreg_vif_xmit()\n ip6mr_cache_report()\n skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4\nAnd skb_push declared as:\n\tvoid *skb_push(struct sk_buff *skb, unsigned int len);\n\t\tskb-\u003edata -= len;\n\t\t//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850\nskb-\u003edata is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53365"
},
{
"category": "external",
"summary": "RHBZ#2396130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396130"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53365"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53365-acb1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53365-acb1@gregkh/T"
}
],
"release_date": "2025-09-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report()"
},
{
"cve": "CVE-2025-38718",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"discovery_date": "2025-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393166"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: linearize cloned gso packets in sctp_rcv\n\nA cloned head skb still shares these frag skbs in fraglist with the\noriginal head skb. It\u0027s not safe to access these frag skbs.\n\nsyzbot reported two use-of-uninitialized-memory bugs caused by this:\n\n BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\n sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\n sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998\n sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\n sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122\n __release_sock+0x1da/0x330 net/core/sock.c:3106\n release_sock+0x6b/0x250 net/core/sock.c:3660\n sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360\n sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885\n sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031\n inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851\n sock_sendmsg_nosec net/socket.c:718 [inline]\n\nand\n\n BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\n sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\n sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88\n sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331\n sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n __release_sock+0x1d3/0x330 net/core/sock.c:3213\n release_sock+0x6b/0x270 net/core/sock.c:3767\n sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367\n sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886\n sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032\n inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851\n sock_sendmsg_nosec net/socket.c:712 [inline]\n\nThis patch fixes it by linearizing cloned gso packets in sctp_rcv().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: linearize cloned gso packets in sctp_rcv",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A flaw in the SCTP receive path failed to linearize cloned GSO sk_buffs before accessing fraglists, leading to reads of uninitialized memory as reported by KMSAN. An attacker sending SCTP traffic can trigger incorrect processing and potentially cause a kernel denial of service on the target under specific RX conditions.\nStream Control Transmission Protocol (SCTP) is a transport-layer protocol (like TCP or UDP) primarily used in telecom signaling and some specialized applications. On most Linux systems it is disabled by default, and remote connectivity is only possible if SCTP support is enabled and listening services are configured (commonly using the IANA-assigned port 2905/tcp for M3UA or other protocol-specific ports). Therefore, the vulnerability is only exploitable when SCTP is enabled and reachable on the target system.\nAlthough KMSAN reports this issue as use of uninitialized memory (which deterministically crashes with KMSAN enabled), on production kernels the impact is still availability-related.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-38718"
},
{
"category": "external",
"summary": "RHBZ#2393166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-38718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38718"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38718-5bb6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38718-5bb6@gregkh/T"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T12:20:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module sctp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.src",
"7Server-RT-ELS:kernel-rt-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.143.1.rt56.1295.el7.noarch",
"7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64",
"7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.143.1.rt56.1295.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: linearize cloned gso packets in sctp_rcv"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…