INFSA-2025:11299: kernel-rt security update
Information about definition
Identificator: INFSA-2025:11299
Type: security
Release date: 2025-07-25 10:14:45 UTC
Information about package
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Vulnerabilities description
- CVE-2025-23150
In the Linux kernel, the following vulnerability has been resolved: ext4: fix off-by-one error in do_split.
- CVE-2025-37738
A use-after-free vulnerability has been discovered in the Linux kernel, specifically within the ext4_xattr_inode_dec_ref_all function (related to the ext4 filesystem's extended attributes). An attacker could exploit this flaw by providing a specially crafted payload, leading to a denial of service condition that compromises system availability.
- CVE-2025-21991
In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes.
- CVE-2025-22004
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send().
- CVE-2022-49058
In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks.
- CVE-2022-49788
In the Linux kernel, the following vulnerability has been resolved: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram().
- CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path.
- CVE-2024-58002
A dangling pointer vulnerability was found in the Linux kernel. When an async control is written, a copy of a pointer is made in the file handle that started the operation. If the user closes that file descriptor, its structure will be freed and there will be one dangling pointer per pending async control that the driver will try to use, leading to denial of service of the system.
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2022-49058
|
no information | 7.0 | no information |
NIST — CVE-2022-49788
|
no information | 7.1 | no information |
NIST — CVE-2024-57980
|
no information | 4.7 | no information |
NIST — CVE-2024-58002
|
no information | 7.0 | no information |
NIST — CVE-2025-21991
|
no information | 6.7 | no information |
NIST — CVE-2025-22004
|
no information | 7.0 | no information |
NIST — CVE-2025-23150
|
no information | 7.1 | no information |
NIST — CVE-2025-37738
|
no information | 7.1 | no information |
Updated packages