Expired Pointer Dereference The advisory has been revoked - it doesn't affect any version of package kernel-rt-64k  (opens in a new tab)


Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-KERNELRT64K-10246761
  • published26 May 2025
  • disclosed27 Mar 2025

Introduced: 27 Mar 2025

CVE-2023-53025  (opens in a new tab)
CWE-825  (opens in a new tab)

Amendment

The Centos security team deemed this advisory irrelevant for Centos:9.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-rt-64k package and not the kernel-rt-64k package as distributed by Centos.

In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix use-after-free in nfsd4_ssc_setup_dul()

If signal_pending() returns true, schedule_timeout() will not be executed, causing the waiting task to remain in the wait queue. Fixed by adding a call to finish_wait(), which ensures that the waiting task will always be removed from the wait queue.