Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2025:10193 - Security Advisory
发布:
2025-07-02
已更新:
2025-07-02

RHSA-2025:10193 - Security Advisory

  • 概述
  • 更新的软件包

概述

Moderate: kernel-rt security update

类型/严重性

Security Advisory: Moderate

Red Hat Insights 补丁分析

识别并修复受此公告影响的系统。

查看受影响的系统

标题

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (CVE-2023-1652)
  • kernel: dlm: fix plock invalid read (CVE-2022-49407)
  • kernel: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx (CVE-2022-49377)
  • kernel: Bluetooth: Fix use after free in hci_send_acl (CVE-2022-49111)
  • kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp() (CVE-2022-49114)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

受影响的产品

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64

修复

  • BZ - 2182031 - CVE-2023-1652 Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c
  • BZ - 2347662 - CVE-2022-49407 kernel: dlm: fix plock invalid read
  • BZ - 2347929 - CVE-2022-49377 kernel: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx
  • BZ - 2347952 - CVE-2022-49111 kernel: Bluetooth: Fix use after free in hci_send_acl
  • BZ - 2348136 - CVE-2022-49114 kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()

CVE

  • CVE-2022-49111
  • CVE-2022-49114
  • CVE-2022-49377
  • CVE-2022-49407
  • CVE-2023-1652

参考

  • https://access.redhat.com/security/updates/classification/#moderate
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM
kernel-rt-5.14.0-70.136.1.rt21.208.el9_0.src.rpm SHA-256: 5749c267f92f752dbc09658d19dae1959d53999cfa58e728abee34c3aebbaa20
x86_64
kernel-rt-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: eca12f1c3ba25f5c05c1571485197bffd195b2705e6ebc552ec3eba819cf4b8b
kernel-rt-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: eca12f1c3ba25f5c05c1571485197bffd195b2705e6ebc552ec3eba819cf4b8b
kernel-rt-core-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: afcb5d0c9fc7a002bed867dcdd40cb5bbe6196fce2b6dd764469e7e8ec0a7d50
kernel-rt-core-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: afcb5d0c9fc7a002bed867dcdd40cb5bbe6196fce2b6dd764469e7e8ec0a7d50
kernel-rt-debug-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 8eedb1e6471cc577ceade040a2bbefb513cce9411f50a6f7e4909a9de022dab2
kernel-rt-debug-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 8eedb1e6471cc577ceade040a2bbefb513cce9411f50a6f7e4909a9de022dab2
kernel-rt-debug-core-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 303be775cd7643c49a39e0935d4984ded19bc141ef543f677d7fb6401813933d
kernel-rt-debug-core-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 303be775cd7643c49a39e0935d4984ded19bc141ef543f677d7fb6401813933d
kernel-rt-debug-debuginfo-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: f4b378a163e275b083e93a10b16430fe81e30efd24578fcbeb9973fd41a081ad
kernel-rt-debug-debuginfo-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: f4b378a163e275b083e93a10b16430fe81e30efd24578fcbeb9973fd41a081ad
kernel-rt-debug-devel-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 2c2c1dba0b64d0ee08806aaaf97b6116e6a813739dc4ef1e8a79d124ee4e1f5c
kernel-rt-debug-devel-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 2c2c1dba0b64d0ee08806aaaf97b6116e6a813739dc4ef1e8a79d124ee4e1f5c
kernel-rt-debug-kvm-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 5e456c2d68b1eab7c0eadbbdb65913b7a5096855e590281d13519790cdfdd260
kernel-rt-debug-modules-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 4a9e396ab7ba4a0d70d7ddc76973d85fa17ded69c4d08fcdb259125eafae6ff7
kernel-rt-debug-modules-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 4a9e396ab7ba4a0d70d7ddc76973d85fa17ded69c4d08fcdb259125eafae6ff7
kernel-rt-debug-modules-extra-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 5d6683c214be3e73662ac337ea3ee581d1bb3967433ab4458ec2060e6221c62f
kernel-rt-debug-modules-extra-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 5d6683c214be3e73662ac337ea3ee581d1bb3967433ab4458ec2060e6221c62f
kernel-rt-debuginfo-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 33a52c2cfae0ddea6ebfe047ca96b62c15b6957901aaebbedd74fae9b1e2df0f
kernel-rt-debuginfo-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 33a52c2cfae0ddea6ebfe047ca96b62c15b6957901aaebbedd74fae9b1e2df0f
kernel-rt-debuginfo-common-x86_64-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: a700c8795af200b4217a865f1288dc3532e085c1299855efb05677e08b354d7e
kernel-rt-debuginfo-common-x86_64-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: a700c8795af200b4217a865f1288dc3532e085c1299855efb05677e08b354d7e
kernel-rt-devel-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 1c49b4c056b3a29b9494e6bb34fac1692170f86c0735bb096bb40c55762f2b8a
kernel-rt-devel-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 1c49b4c056b3a29b9494e6bb34fac1692170f86c0735bb096bb40c55762f2b8a
kernel-rt-kvm-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 9247e99daeb16bb074ab1c41d5eca27768aed2cbf333e18024317cdb69377ea5
kernel-rt-modules-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 2ad38c8c38eb989db20030433044dcf1161172f387fc789ad8d868957d5f300c
kernel-rt-modules-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: 2ad38c8c38eb989db20030433044dcf1161172f387fc789ad8d868957d5f300c
kernel-rt-modules-extra-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: ddc7a521002cde550724509c0f341b56f7bde2f06275ae7c383f3e45d41045a5
kernel-rt-modules-extra-5.14.0-70.136.1.rt21.208.el9_0.x86_64.rpm SHA-256: ddc7a521002cde550724509c0f341b56f7bde2f06275ae7c383f3e45d41045a5

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility