Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Red Hat Kernel RT Security Update Affects System Integrity
RHSA-2026:3375
Summary
A security update is available for the Red Hat kernel RT package, which fixes a flaw that could allow an attacker to bypass security restrictions. This affects systems running the Red Hat kernel RT and could allow an attacker to escalate privileges. To resolve this issue, apply the latest security update.
What to do
- Update redhat kernel-rt to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-core to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug-core to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug-debuginfo to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug-devel to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug-kvm to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug-modules to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debug-modules-extra to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debuginfo to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-devel to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-kvm to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-modules to version 0:5.14.0-70.167.1.rt21.239.el9_0.
- Update redhat kernel-rt-modules-extra to version 0:5.14.0-70.167.1.rt21.239.el9_0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel-rt | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-core | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-core | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-debuginfo | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-devel | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-kvm | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-modules | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-modules-extra | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debuginfo | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-devel | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-kvm | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-modules | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-modules-extra | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-core | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-core | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-debuginfo | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-devel | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-kvm | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-modules | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debug-modules-extra | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debuginfo | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-devel | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-kvm | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-modules | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
| redhat | kernel-rt-modules-extra | <= 0:5.14.0-70.167.1.rt21.239.el9_0 | 0:5.14.0-70.167.1.rt21.239.el9_0 |
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3375 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2373326 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383404 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394601 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2401432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419837 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419919 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420329 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2424880 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3375.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-53821 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53821 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53821 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53821-9542@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38022 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38022 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38022 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2025-38022-41b3@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38415 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38415 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38415 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39760 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39760 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39760 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39933 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39933 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39933 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40269 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40269 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40269 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40271 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40271 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40271 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68349 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68349 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68349 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh... Third Party Advisory
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026