{"id":"RHSA-2026:3358","summary":"Red Hat Security Advisory: kernel-rt security update","modified":"2026-05-07T10:09:13Z","published":"2026-02-26T10:23:24Z","upstream":["CVE-2022-50673","CVE-2023-53192","CVE-2023-53762","CVE-2023-53821","CVE-2025-37861","CVE-2025-37882","CVE-2025-38415","CVE-2025-39760","CVE-2025-39933","CVE-2025-40269","CVE-2025-40271","CVE-2025-68349"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2365250"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2365256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383404"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395232"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419838"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419919"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420329"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424880"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3358.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50673"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50673"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120947-CVE-2022-50673-f920@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53192"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53762"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53762"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53762"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53821"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53821"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53821"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53821-9542@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-37861"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-37861"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37861"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050922-CVE-2025-37861-ab7f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-37882"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-37882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37882"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050944-CVE-2025-37882-db64@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38415"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38415"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38415"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-39760"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-39760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39760"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-39933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-39933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39933"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40269"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40269"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40269"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40271"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-68349"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-68349"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68349"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh/T"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_e4s:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.158.1.rt14.443.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:3358.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}