Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1495 - Security Advisory
Issued:
2026-01-28
Updated:
2026-01-28

RHSA-2026:1495 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: mac80211: fix potential double free on mesh join (CVE-2022-49290)
  • kernel: net: bonding: fix use-after-free after 802.3ad slave unbind (CVE-2022-49667)
  • kernel: Linux kernel: be2net buffer overflow in be_get_module_eeprom (CVE-2022-49581)
  • kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (CVE-2023-53034)
  • kernel: net: openvswitch: fix nested key length validation in the set() action (CVE-2025-37789)
  • kernel: KVM: arm64: Tear down vGIC on failed vCPU creation (CVE-2025-37849)
  • kernel: smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051)
  • kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)
  • kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)
  • kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154)
  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)
  • kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258)
  • kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64

Fixes

  • BZ - 2347727 - CVE-2022-49290 kernel: mac80211: fix potential double free on mesh join
  • BZ - 2347982 - CVE-2022-49667 kernel: net: bonding: fix use-after-free after 802.3ad slave unbind
  • BZ - 2348269 - CVE-2022-49581 kernel: Linux kernel: be2net buffer overflow in be_get_module_eeprom
  • BZ - 2360239 - CVE-2023-53034 kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
  • BZ - 2363315 - CVE-2025-37789 kernel: net: openvswitch: fix nested key length validation in the set() action
  • BZ - 2365271 - CVE-2025-37849 kernel: KVM: arm64: Tear down vGIC on failed vCPU creation
  • BZ - 2373329 - CVE-2025-38051 kernel: smb: client: Fix use-after-free in cifs_fill_dirent
  • BZ - 2401510 - CVE-2023-53539 kernel: RDMA/rxe: Fix incomplete state save in rxe_requester
  • BZ - 2404108 - CVE-2025-39971 kernel: i40e: fix idx validation in config queues msg
  • BZ - 2414494 - CVE-2025-40154 kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption
  • BZ - 2418876 - CVE-2025-40258 kernel: mptcp: fix race condition in mptcp_schedule_work()
  • BZ - 2419954 - CVE-2025-40277 kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVEs

  • CVE-2022-49290
  • CVE-2022-49581
  • CVE-2022-49667
  • CVE-2023-53034
  • CVE-2023-53539
  • CVE-2025-37789
  • CVE-2025-37849
  • CVE-2025-38051
  • CVE-2025-39971
  • CVE-2025-40154
  • CVE-2025-40248
  • CVE-2025-40258
  • CVE-2025-40277

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM
kernel-rt-5.14.0-70.163.1.rt21.235.el9_0.src.rpm SHA-256: b52cf387d83f062f634ac4bbf887f994118cd8ab7e1a9b4b2934d49d280d5630
x86_64
kernel-rt-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 5d84e142ce06ab0c73de2ffbe250c48d05667da9aa209fc25d25c47d3bf3627a
kernel-rt-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 5d84e142ce06ab0c73de2ffbe250c48d05667da9aa209fc25d25c47d3bf3627a
kernel-rt-core-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: e458504582b43170783ac14edf125835bec04831cbb9b0cd7e9691d3d18f155b
kernel-rt-core-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: e458504582b43170783ac14edf125835bec04831cbb9b0cd7e9691d3d18f155b
kernel-rt-debug-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 7b59e9ed45b87d73002a3dd635ed1fde48951cf1bff6e45f2bb3d71b9e8398eb
kernel-rt-debug-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 7b59e9ed45b87d73002a3dd635ed1fde48951cf1bff6e45f2bb3d71b9e8398eb
kernel-rt-debug-core-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 7065be56af56ed5953e7bad3cd5ce878993ad84bd8d7054b5d369326649edf3e
kernel-rt-debug-core-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 7065be56af56ed5953e7bad3cd5ce878993ad84bd8d7054b5d369326649edf3e
kernel-rt-debug-debuginfo-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 7f5ebe8518101ab2b67604108d51a7b4f6fc0b0b731b1449bbd43e6700d39d76
kernel-rt-debug-debuginfo-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 7f5ebe8518101ab2b67604108d51a7b4f6fc0b0b731b1449bbd43e6700d39d76
kernel-rt-debug-devel-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 9dd7a2c5fec30b3e5ad6b20616fe19484bc49c8cb12d46411556ad1e0a69a643
kernel-rt-debug-devel-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 9dd7a2c5fec30b3e5ad6b20616fe19484bc49c8cb12d46411556ad1e0a69a643
kernel-rt-debug-kvm-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: d3d502fd3664b6827767f423ec0a9cde3afa27c4fb4ab99724bb0aec2d5bca90
kernel-rt-debug-modules-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 4d314378f0bd5219a7477fc8957e3b372bac6e07555286caaa5be3e2831753aa
kernel-rt-debug-modules-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 4d314378f0bd5219a7477fc8957e3b372bac6e07555286caaa5be3e2831753aa
kernel-rt-debug-modules-extra-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: dc04be02f055cd2a7dcd076dd98030963b45d4792d22f0f35a15ce9f536ce5e5
kernel-rt-debug-modules-extra-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: dc04be02f055cd2a7dcd076dd98030963b45d4792d22f0f35a15ce9f536ce5e5
kernel-rt-debuginfo-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 6cd34bc6f5e5c14befc772bf5f4f34ba4cedb2f33797bbb454665640096f328a
kernel-rt-debuginfo-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 6cd34bc6f5e5c14befc772bf5f4f34ba4cedb2f33797bbb454665640096f328a
kernel-rt-debuginfo-common-x86_64-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: a36b94c29c9bcbcc59d4a894428e7ffffe668ff5b65b0ff5b9e85042cdb0ce69
kernel-rt-debuginfo-common-x86_64-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: a36b94c29c9bcbcc59d4a894428e7ffffe668ff5b65b0ff5b9e85042cdb0ce69
kernel-rt-devel-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 95ed45bbe3b68e6e8d49714c16596e7d5610ad9a2392b1982b973f7520fdb3bd
kernel-rt-devel-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: 95ed45bbe3b68e6e8d49714c16596e7d5610ad9a2392b1982b973f7520fdb3bd
kernel-rt-kvm-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: e1a531557641d0b1040b0155c6e79bb0fdf41283443afba268c130d4d96575aa
kernel-rt-modules-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: ca9091fdfdc50254508ca14cc6b68fbf3e085d5ed556971e2657f8d29fc9b93c
kernel-rt-modules-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: ca9091fdfdc50254508ca14cc6b68fbf3e085d5ed556971e2657f8d29fc9b93c
kernel-rt-modules-extra-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: ede1ce908a349e15b1460882ff7df02b8c1cb0b0704044d735d6c942fc7e4649
kernel-rt-modules-extra-5.14.0-70.163.1.rt21.235.el9_0.x86_64.rpm SHA-256: ede1ce908a349e15b1460882ff7df02b8c1cb0b0704044d735d6c942fc7e4649

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility