{"id":"RHSA-2025:10829","summary":"Red Hat Security Advisory: kernel-rt security update","modified":"2026-03-18T11:38:15.026196Z","published":"2025-07-14T10:02:33Z","upstream":["CVE-2022-49122","CVE-2022-49395","CVE-2022-49846","CVE-2022-50066","CVE-2023-52933","CVE-2025-21759","CVE-2025-22004","CVE-2025-22104","CVE-2025-22121","CVE-2025-37738"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347899"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348596"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357142"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360265"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363305"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373683"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10829.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49122"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49122"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2022-49122-b139@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49395"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49395"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49395"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022650-CVE-2022-49395-7419@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49846"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49846"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49846"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050142-CVE-2022-49846-728c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50066"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061851-CVE-2022-50066-a2ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52933"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52933-f292@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21759"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21759"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21759-ad7c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-22004"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-22004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22004"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025040349-CVE-2025-22004-64f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-22104"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-22104"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22104"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025041622-CVE-2025-22104-0a82@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-22121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-22121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22121"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025041628-CVE-2025-22121-52fd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-37738"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-37738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37738"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050132-CVE-2025-37738-deb1@gregkh/T"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.138.1.rt21.210.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:10829.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"}]}