rhsa-2025:14094
Vulnerability from csaf_redhat
Published
2025-08-19 13:19
Modified
2025-09-02 09:25
Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: selinux: Add boundary check in put_entry() (CVE-2022-50200)
* kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)
* kernel: drivers:md:fix a potential use-after-free bug (CVE-2022-50022)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)\n\n* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)\n\n* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)\n\n* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)\n\n* kernel: selinux: Add boundary check in put_entry() (CVE-2022-50200)\n\n* kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)\n\n* kernel: drivers:md:fix a potential use-after-free bug (CVE-2022-50022)\n\n* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:14094", "url": "https://access.redhat.com/errata/RHSA-2025:14094" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2348516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348516" }, { "category": "external", "summary": "2356917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356917" }, { "category": "external", "summary": "2360099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2360099" }, { "category": "external", "summary": "2363672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363672" }, { "category": "external", "summary": "2373605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373605" }, { "category": "external", "summary": "2373630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373630" }, { "category": "external", "summary": "2373672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373672" }, { "category": "external", "summary": "2375305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2375305" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14094.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2025-09-02T09:25:15+00:00", "generator": { "date": "2025-09-02T09:25:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:14094", "initial_release_date": "2025-08-19T13:19:03+00:00", "revision_history": [ { "date": "2025-08-19T13:19:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-19T13:19:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-02T09:25:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux NFV E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "product": { "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "product_id": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.142.1.rt21.214.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.142.1.rt21.214.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50020", "cwe": { "id": "CWE-1284", "name": "Improper Validation of Specified Quantity in Input" }, "discovery_date": "2025-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2373630" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary. An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ext4: avoid resizing to a partial cluster size", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-50020" }, { "category": "external", "summary": "RHBZ#2373630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373630" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50020", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50020" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50020-6f27@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50020-6f27@gregkh/T" } ], "release_date": "2025-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ext4: avoid resizing to a partial cluster size" }, { "cve": "CVE-2022-50022", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2373672" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers:md:fix a potential use-after-free bug", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-50022" }, { "category": "external", "summary": "RHBZ#2373672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373672" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50022", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50022" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50022-98b6@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50022-98b6@gregkh/T" } ], "release_date": "2025-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: drivers:md:fix a potential use-after-free bug" }, { "cve": "CVE-2022-50200", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2025-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2373605" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: Add boundary check in put_entry()\n\nJust like next_entry(), boundary check is necessary to prevent memory\nout-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: selinux: Add boundary check in put_entry()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-50200" }, { "category": "external", "summary": "RHBZ#2373605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50200", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50200" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50200-51f0@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50200-51f0@gregkh/T" } ], "release_date": "2025-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: selinux: Add boundary check in put_entry()" }, { "cve": "CVE-2025-21727", "cwe": { "id": "CWE-820", "name": "Missing Synchronization" }, "discovery_date": "2025-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348516" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: fix UAF in padata_reorder\n\nA bug was found when run ltp test:\n\nBUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0\nRead of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206\n\nCPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+\nWorkqueue: pdecrypt_parallel padata_parallel_worker\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x32/0x50\nprint_address_description.constprop.0+0x6b/0x3d0\nprint_report+0xdd/0x2c0\nkasan_report+0xa5/0xd0\npadata_find_next+0x29/0x1a0\npadata_reorder+0x131/0x220\npadata_parallel_worker+0x3d/0xc0\nprocess_one_work+0x2ec/0x5a0\n\nIf \u0027mdelay(10)\u0027 is added before calling \u0027padata_find_next\u0027 in the\n\u0027padata_reorder\u0027 function, this issue could be reproduced easily with\nltp test (pcrypt_aead01).\n\nThis can be explained as bellow:\n\npcrypt_aead_encrypt\n...\npadata_do_parallel\nrefcount_inc(\u0026pd-\u003erefcnt); // add refcnt\n...\npadata_do_serial\npadata_reorder // pd\nwhile (1) {\npadata_find_next(pd, true); // using pd\nqueue_work_on\n...\npadata_serial_worker\t\t\t\tcrypto_del_alg\npadata_put_pd_cnt // sub refcnt\n\t\t\t\t\t\tpadata_free_shell\n\t\t\t\t\t\tpadata_put_pd(ps-\u003epd);\n\t\t\t\t\t\t// pd is freed\n// loop again, but pd is freed\n// call padata_find_next, UAF\n}\n\nIn the padata_reorder function, when it loops in \u0027while\u0027, if the alg is\ndeleted, the refcnt may be decreased to 0 before entering\n\u0027padata_find_next\u0027, which leads to UAF.\n\nAs mentioned in [1], do_serial is supposed to be called with BHs disabled\nand always happen under RCU protection, to address this issue, add\nsynchronize_rcu() in \u0027padata_free_shell\u0027 wait for all _do_serial calls\nto finish.\n\n[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/\n[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: padata: fix UAF in padata_reorder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-21727" }, { "category": "external", "summary": "RHBZ#2348516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348516" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T" } ], "release_date": "2025-02-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: padata: fix UAF in padata_reorder" }, { "cve": "CVE-2025-21991", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2356917" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes\n\nCurrently, load_microcode_amd() iterates over all NUMA nodes, retrieves their\nCPU masks and unconditionally accesses per-CPU data for the first CPU of each\nmask.\n\nAccording to Documentation/admin-guide/mm/numaperf.rst:\n\n \"Some memory may share the same node as a CPU, and others are provided as\n memory only nodes.\"\n\nTherefore, some node CPU masks may be empty and wouldn\u0027t have a \"first CPU\".\n\nOn a machine with far memory (and therefore CPU-less NUMA nodes):\n- cpumask_of_node(nid) is 0\n- cpumask_first(0) is CONFIG_NR_CPUS\n- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an\n index that is 1 out of bounds\n\nThis does not have any security implications since flashing microcode is\na privileged operation but I believe this has reliability implications by\npotentially corrupting memory while flashing a microcode update.\n\nWhen booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes\na microcode update. I get the following splat:\n\n UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y\n index 512 is out of range for type \u0027unsigned long[512]\u0027\n [...]\n Call Trace:\n dump_stack\n __ubsan_handle_out_of_bounds\n load_microcode_amd\n request_microcode_amd\n reload_store\n kernfs_fop_write_iter\n vfs_write\n ksys_write\n do_syscall_64\n entry_SYSCALL_64_after_hwframe\n\nChange the loop to go over only NUMA nodes which have CPUs before determining\nwhether the first CPU on the respective node needs microcode update.\n\n [ bp: Massage commit message, fix typo. ]", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-21991" }, { "category": "external", "summary": "RHBZ#2356917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21991", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21991" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025040257-CVE-2025-21991-6aae@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025040257-CVE-2025-21991-6aae@gregkh/T" } ], "release_date": "2025-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes" }, { "cve": "CVE-2025-22020", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2360099" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove\n\nThis fixes the following crash:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\nRead of size 8 at addr ffff888136335380 by task kworker/6:0/140241\n\nCPU: 6 UID: 0 PID: 140241 Comm: kworker/6:0 Kdump: loaded Tainted: G E 6.14.0-rc6+ #1\nTainted: [E]=UNSIGNED_MODULE\nHardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024\nWorkqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms]\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x27/0x320\n ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\n print_report+0x3e/0x70\n kasan_report+0xab/0xe0\n ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\n rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\n ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms]\n ? __pfx___schedule+0x10/0x10\n ? kick_pool+0x3b/0x270\n process_one_work+0x357/0x660\n worker_thread+0x390/0x4c0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x190/0x1d0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2d/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 161446:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x10/0x30\n __kasan_kmalloc+0x7b/0x90\n __kmalloc_noprof+0x1a7/0x470\n memstick_alloc_host+0x1f/0xe0 [memstick]\n rtsx_usb_ms_drv_probe+0x47/0x320 [rtsx_usb_ms]\n platform_probe+0x60/0xe0\n call_driver_probe+0x35/0x120\n really_probe+0x123/0x410\n __driver_probe_device+0xc7/0x1e0\n driver_probe_device+0x49/0xf0\n __device_attach_driver+0xc6/0x160\n bus_for_each_drv+0xe4/0x160\n __device_attach+0x13a/0x2b0\n bus_probe_device+0xbd/0xd0\n device_add+0x4a5/0x760\n platform_device_add+0x189/0x370\n mfd_add_device+0x587/0x5e0\n mfd_add_devices+0xb1/0x130\n rtsx_usb_probe+0x28e/0x2e0 [rtsx_usb]\n usb_probe_interface+0x15c/0x460\n call_driver_probe+0x35/0x120\n really_probe+0x123/0x410\n __driver_probe_device+0xc7/0x1e0\n driver_probe_device+0x49/0xf0\n __device_attach_driver+0xc6/0x160\n bus_for_each_drv+0xe4/0x160\n __device_attach+0x13a/0x2b0\n rebind_marked_interfaces.isra.0+0xcc/0x110\n usb_reset_device+0x352/0x410\n usbdev_do_ioctl+0xe5c/0x1860\n usbdev_ioctl+0xa/0x20\n __x64_sys_ioctl+0xc5/0xf0\n do_syscall_64+0x59/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 161506:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x36/0x60\n __kasan_slab_free+0x34/0x50\n kfree+0x1fd/0x3b0\n device_release+0x56/0xf0\n kobject_cleanup+0x73/0x1c0\n rtsx_usb_ms_drv_remove+0x13d/0x220 [rtsx_usb_ms]\n platform_remove+0x2f/0x50\n device_release_driver_internal+0x24b/0x2e0\n bus_remove_device+0x124/0x1d0\n device_del+0x239/0x530\n platform_device_del.part.0+0x19/0xe0\n platform_device_unregister+0x1c/0x40\n mfd_remove_devices_fn+0x167/0x170\n device_for_each_child_reverse+0xc9/0x130\n mfd_remove_devices+0x6e/0xa0\n rtsx_usb_disconnect+0x2e/0xd0 [rtsx_usb]\n usb_unbind_interface+0xf3/0x3f0\n device_release_driver_internal+0x24b/0x2e0\n proc_disconnect_claim+0x13d/0x220\n usbdev_do_ioctl+0xb5e/0x1860\n usbdev_ioctl+0xa/0x20\n __x64_sys_ioctl+0xc5/0xf0\n do_syscall_64+0x59/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nLast potentially related work creation:\n kasan_save_stack+0x20/0x40\n kasan_record_aux_stack+0x85/0x90\n insert_work+0x29/0x100\n __queue_work+0x34a/0x540\n call_timer_fn+0x2a/0x160\n expire_timers+0x5f/0x1f0\n __run_timer_base.part.0+0x1b6/0x1e0\n run_timer_softirq+0x8b/0xe0\n handle_softirqs+0xf9/0x360\n __irq_exit_rcu+0x114/0x130\n sysvec_apic_timer_interrupt+0x72/0x90\n asm_sysvec_apic_timer_interrupt+0x16/0x20\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x20/0x40\n kasan_record_aux_stack+0x85/0x90\n insert_work+0x29/0x100\n __queue_work+0x34a/0x540\n call_timer_fn+0x2a/0x160\n expire_timers+0x5f/0x1f0\n __run_timer_base.part.0+0x1b6/0x1e0\n run_timer_softirq+0x8b/0xe0\n handle_softirqs+0xf9/0x\n---truncated---", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22020" }, { "category": "external", "summary": "RHBZ#2360099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2360099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22020" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025041642-CVE-2025-22020-70e8@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025041642-CVE-2025-22020-70e8@gregkh/T" } ], "release_date": "2025-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove" }, { "cve": "CVE-2025-37797", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2363672" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class handling\n\nThis patch fixes a Use-After-Free vulnerability in the HFSC qdisc class\nhandling. The issue occurs due to a time-of-check/time-of-use condition\nin hfsc_change_class() when working with certain child qdiscs like netem\nor codel.\n\nThe vulnerability works as follows:\n1. hfsc_change_class() checks if a class has packets (q.qlen != 0)\n2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,\n codel, netem) might drop packets and empty the queue\n3. The code continues assuming the queue is still non-empty, adding\n the class to vttree\n4. This breaks HFSC scheduler assumptions that only non-empty classes\n are in vttree\n5. Later, when the class is destroyed, this can lead to a Use-After-Free\n\nThe fix adds a second queue length check after qdisc_peek_len() to verify\nthe queue wasn\u0027t emptied.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling", "title": "Vulnerability summary" }, { "category": "other", "text": "The bug could happen only when qdisc with child qdiscs like netem or codel being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-37797" }, { "category": "external", "summary": "RHBZ#2363672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363672" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-37797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-37797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37797" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025050210-CVE-2025-37797-2aab@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025050210-CVE-2025-37797-2aab@gregkh/T" } ], "release_date": "2025-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" }, { "category": "workaround", "details": "To mitigate this issue, prevent module sch_hfsc from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling" }, { "cve": "CVE-2025-38086", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2025-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2375305" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ch9200: fix uninitialised access during mii_nway_restart\n\nIn mii_nway_restart() the code attempts to call\nmii-\u003emdio_read which is ch9200_mdio_read(). ch9200_mdio_read()\nutilises a local buffer called \"buff\", which is initialised\nwith control_read(). However \"buff\" is conditionally\ninitialised inside control_read():\n\n if (err == size) {\n memcpy(data, buf, size);\n }\n\nIf the condition of \"err == size\" is not met, then\n\"buff\" remains uninitialised. Once this happens the\nuninitialised \"buff\" is accessed and returned during\nch9200_mdio_read():\n\n return (buff[0] | buff[1] \u003c\u003c 8);\n\nThe problem stems from the fact that ch9200_mdio_read()\nignores the return value of control_read(), leading to\nuinit-access of \"buff\".\n\nTo fix this we should check the return value of\ncontrol_read() and return early on error.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: ch9200: fix uninitialised access during mii_nway_restart", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-38086" }, { "category": "external", "summary": "RHBZ#2375305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2375305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-38086", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-38086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38086" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025062801-CVE-2025-38086-783b@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025062801-CVE-2025-38086-783b@gregkh/T" } ], "release_date": "2025-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:19:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.142.1.rt21.214.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: ch9200: fix uninitialised access during mii_nway_restart" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…