Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.5

Red Hat Kernel Real-Time Update Fixes Security Flaw

RHSA-2026:3358
Summary

Red Hat has released an update to their kernel-rt software to fix a security vulnerability. This update affects users of Red Hat kernel-rt, which provides real-time capabilities for Linux systems. If left unpatched, this flaw could allow an attacker to gain unauthorized access to systems using kernel-rt.

What to do
  • Update redhat kernel-rt to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-debuginfo to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-devel to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-kvm to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-modules to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-modules-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debug-modules-extra to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debuginfo to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-devel to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-kvm to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-modules to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-modules-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
  • Update redhat kernel-rt-modules-extra to version 0:5.14.0-284.158.1.rt14.443.el9_2.
Affected software
VendorProductAffected versionsFix available
redhat kernel-rt <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-debuginfo <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-devel <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-kvm <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-modules <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-modules-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-modules-extra <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debuginfo <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debuginfo-common-x86_64 <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-devel <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-kvm <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-modules <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-modules-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-modules-extra <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-debuginfo <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-devel <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-kvm <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-modules <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-modules-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debug-modules-extra <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debuginfo <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-debuginfo-common-x86_64 <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-devel <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-kvm <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-modules <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-modules-core <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
redhat kernel-rt-modules-extra <= 0:5.14.0-284.158.1.rt14.443.el9_2 0:5.14.0-284.158.1.rt14.443.el9_2
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1 7.5
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026