Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Red Hat Kernel Real-Time Update Fixes Security Flaw
RHSA-2026:3358
Summary
Red Hat has released an update to their kernel-rt software to fix a security vulnerability. This update affects users of Red Hat kernel-rt, which provides real-time capabilities for Linux systems. If left unpatched, this flaw could allow an attacker to gain unauthorized access to systems using kernel-rt.
What to do
- Update redhat kernel-rt to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-debuginfo to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-devel to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-kvm to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-modules to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-modules-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debug-modules-extra to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debuginfo to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-devel to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-kvm to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-modules to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-modules-core to version 0:5.14.0-284.158.1.rt14.443.el9_2.
- Update redhat kernel-rt-modules-extra to version 0:5.14.0-284.158.1.rt14.443.el9_2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel-rt | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-debuginfo | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-devel | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-kvm | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-modules | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-modules-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-modules-extra | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debuginfo | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-devel | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-kvm | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-modules | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-modules-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-modules-extra | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-debuginfo | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-devel | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-kvm | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-modules | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-modules-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debug-modules-extra | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debuginfo | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-devel | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-kvm | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-modules | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-modules-core | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
| redhat | kernel-rt-modules-extra | <= 0:5.14.0-284.158.1.rt14.443.el9_2 | 0:5.14.0-284.158.1.rt14.443.el9_2 |
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3358 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2365250 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2365256 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383404 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394601 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2395232 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2401432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419837 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419838 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419919 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420329 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420347 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2424880 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3358.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-50673 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2022-50673 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-50673 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120947-CVE-2022-50673-f920@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53192 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53192 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53192 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53762 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53762 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53762 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53821 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53821 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53821 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53821-9542@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-37861 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-37861 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-37861 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025050922-CVE-2025-37861-ab7f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-37882 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-37882 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-37882 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025050944-CVE-2025-37882-db64@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38415 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38415 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38415 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39760 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39760 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39760 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39933 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39933 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39933 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40269 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40269 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40269 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40271 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40271 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40271 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68349 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68349 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68349 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh... Third Party Advisory
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026