{"id":"RHSA-2025:14746","summary":"Red Hat Security Advisory: kernel-rt security update","modified":"2026-03-18T10:49:09Z","published":"2025-08-31T10:13:43Z","upstream":["CVE-2022-49788","CVE-2022-50020","CVE-2022-50022","CVE-2024-57980","CVE-2025-21928","CVE-2025-23150","CVE-2025-38000","CVE-2025-38177","CVE-2025-38350"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14746"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348599"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2356592"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373630"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373672"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2382054"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14746.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49788"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49788"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49788"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050121-CVE-2022-49788-6e84@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50020"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50020"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50020-6f27@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50022"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50022-98b6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57980"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57980"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57980-4b5a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21928"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21928"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21928-e444@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-23150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-23150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-23150"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050127-CVE-2025-23150-15b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38000"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38000"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38000"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025060639-CVE-2025-38000-f5a4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38177"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38177"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025070411-CVE-2025-38177-bd6c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38350"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38350"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38350"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025071933-CVE-2025-38350-262a@gregkh/T"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-doc","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-trace","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-trace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-trace-debuginfo","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-trace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}},{"package":{"name":"kernel-rt-trace-devel","ecosystem":"Red Hat:rhel_extras_rt_els:7","purl":"pkg:rpm/redhat/kernel-rt-trace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.137.1.rt56.1289.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:14746.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}