INFSA-2025:11299: kernel-rt security update

Information about definition

Identificator: INFSA-2025:11299

Type: security

Release date: 2025-07-25 10:14:45 UTC

Information about package

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Vulnerabilities description

  • CVE-2025-23150

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix off-by-one error in do_split.

  • CVE-2025-37738

    A use-after-free vulnerability has been discovered in the Linux kernel, specifically within the ext4_xattr_inode_dec_ref_all function (related to the ext4 filesystem's extended attributes). An attacker could exploit this flaw by providing a specially crafted payload, leading to a denial of service condition that compromises system availability.

  • CVE-2025-21991

    In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes.

  • CVE-2025-22004

    In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send().

  • CVE-2022-49058

    In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks.

  • CVE-2022-49788

    In the Linux kernel, the following vulnerability has been resolved: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram().

  • CVE-2024-57980

    In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path.

  • CVE-2024-58002

    A dangling pointer vulnerability was found in the Linux kernel. When an async control is written, a copy of a pointer is made in the file handle that started the operation. If the user closes that file descriptor, its structure will be freed and there will be one dangling pointer per pending async control that the driver will try to use, leading to denial of service of the system.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 7.0 no information
no information 7.1 no information
no information 4.7 no information
no information 7.0 no information
no information 6.7 no information
no information 7.0 no information
no information 7.1 no information
no information 7.1 no information
Critical, important, moderate, low

Updated packages