Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2583 - Security Advisory
Issued:
2026-02-11
Updated:
2026-02-11

RHSA-2026:2583 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022)
  • kernel: smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051)
  • kernel: Bluetooth: hci_event: call disconnect callback before deleting conn (CVE-2023-53673)
  • kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (CVE-2025-40096)
  • kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258)
  • kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (CVE-2025-40251)
  • kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service. (CVE-2025-40304)
  • kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322)
  • kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state (CVE-2023-53833)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.2 x86_64

Fixes

  • BZ - 2373326 - CVE-2025-38022 kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
  • BZ - 2373329 - CVE-2025-38051 kernel: smb: client: Fix use-after-free in cifs_fill_dirent
  • BZ - 2402193 - CVE-2023-53673 kernel: Bluetooth: hci_event: call disconnect callback before deleting conn
  • BZ - 2407333 - CVE-2025-40096 kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
  • BZ - 2418876 - CVE-2025-40258 kernel: mptcp: fix race condition in mptcp_schedule_work()
  • BZ - 2418892 - CVE-2025-40251 kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
  • BZ - 2419870 - CVE-2025-40304 kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
  • BZ - 2419902 - CVE-2025-40322 kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
  • BZ - 2420366 - CVE-2023-53833 kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state

CVEs

  • CVE-2023-53673
  • CVE-2023-53833
  • CVE-2025-38022
  • CVE-2025-38051
  • CVE-2025-40096
  • CVE-2025-40251
  • CVE-2025-40258
  • CVE-2025-40304
  • CVE-2025-40322

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kernel-rt-5.14.0-284.156.1.rt14.441.el9_2.src.rpm SHA-256: 83ab09834a5f3028a906190de29a69cf6a918f949fe11eee6f59e12afaa6e649
x86_64
kernel-rt-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 9cc6be8be98c451ddc0939ca7caaa9eac41c54f42f2e1acd9c46e0a282063cca
kernel-rt-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 9cc6be8be98c451ddc0939ca7caaa9eac41c54f42f2e1acd9c46e0a282063cca
kernel-rt-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: e7dbce880bc72b865ce290b504855172cf4bc849c953e9533a09febaf978e347
kernel-rt-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: e7dbce880bc72b865ce290b504855172cf4bc849c953e9533a09febaf978e347
kernel-rt-debug-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 01985354ebcb627661841e6b0009882fd3864a1ecff20bb25fb6bbef5265a797
kernel-rt-debug-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 01985354ebcb627661841e6b0009882fd3864a1ecff20bb25fb6bbef5265a797
kernel-rt-debug-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: ea92e02d05682b268e14990f39849fb889bf132d610d94a1588b7a86ad4ebca8
kernel-rt-debug-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: ea92e02d05682b268e14990f39849fb889bf132d610d94a1588b7a86ad4ebca8
kernel-rt-debug-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 04fa1b4cc7629a4bebe3cc150e1552c98e439ed4de1894e2ea1314f95bb1b275
kernel-rt-debug-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 04fa1b4cc7629a4bebe3cc150e1552c98e439ed4de1894e2ea1314f95bb1b275
kernel-rt-debug-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 6c386fda68ad73e381d51205471da0fb6525d90f8d9fddcfd3df13724ae67831
kernel-rt-debug-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 6c386fda68ad73e381d51205471da0fb6525d90f8d9fddcfd3df13724ae67831
kernel-rt-debug-kvm-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: bdafa9fdca7478cd98e9a19b0fd4ec77fd9db190fbcac00a38c50dc149ea10bd
kernel-rt-debug-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 5a5d30d5c819c6808808d78bce3b8ef8dd55e3dbc0b87ba41ff4bac651728f99
kernel-rt-debug-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 5a5d30d5c819c6808808d78bce3b8ef8dd55e3dbc0b87ba41ff4bac651728f99
kernel-rt-debug-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 279619f2dd31d36f83953be26f50229dc864095d33d6400700b42e56585e7147
kernel-rt-debug-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 279619f2dd31d36f83953be26f50229dc864095d33d6400700b42e56585e7147
kernel-rt-debug-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 166cc84631c4f9324daa99292f131d63143434961af9bd5114321f7d53a6f5c3
kernel-rt-debug-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 166cc84631c4f9324daa99292f131d63143434961af9bd5114321f7d53a6f5c3
kernel-rt-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b31ac0c6d3e70de9aee3866ecb48b4b3a986fe0518d134f0b6c147c67024e61
kernel-rt-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b31ac0c6d3e70de9aee3866ecb48b4b3a986fe0518d134f0b6c147c67024e61
kernel-rt-debuginfo-common-x86_64-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: d161b7eae637a898879a5109d8301915a467177f1e49b635959dae0826ca1454
kernel-rt-debuginfo-common-x86_64-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: d161b7eae637a898879a5109d8301915a467177f1e49b635959dae0826ca1454
kernel-rt-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 25a245f078a55fa9a8351cbc00e0d3e21aee2dde4a169a4cb0913a3566fe326a
kernel-rt-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 25a245f078a55fa9a8351cbc00e0d3e21aee2dde4a169a4cb0913a3566fe326a
kernel-rt-kvm-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 87d92f2b9aad2e664ed1932c49808a5ceb1b6c26aa25c8f418738595e7853755
kernel-rt-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: fd0c9fcaf6f3aa0b86d4751d0d41e347f811166ffbb9abc8646355d7aa533070
kernel-rt-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: fd0c9fcaf6f3aa0b86d4751d0d41e347f811166ffbb9abc8646355d7aa533070
kernel-rt-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b67c01cd9471a9ee1697368106035980f1e02806315d22f91d0dccf30c8a009
kernel-rt-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b67c01cd9471a9ee1697368106035980f1e02806315d22f91d0dccf30c8a009
kernel-rt-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 7d75c2f2ea4ec9794adea2c767cd4e52129f6c045da706a32d902cc048273798
kernel-rt-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 7d75c2f2ea4ec9794adea2c767cd4e52129f6c045da706a32d902cc048273798

Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.2

SRPM
kernel-rt-5.14.0-284.156.1.rt14.441.el9_2.src.rpm SHA-256: 83ab09834a5f3028a906190de29a69cf6a918f949fe11eee6f59e12afaa6e649
x86_64
kernel-rt-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 9cc6be8be98c451ddc0939ca7caaa9eac41c54f42f2e1acd9c46e0a282063cca
kernel-rt-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 9cc6be8be98c451ddc0939ca7caaa9eac41c54f42f2e1acd9c46e0a282063cca
kernel-rt-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: e7dbce880bc72b865ce290b504855172cf4bc849c953e9533a09febaf978e347
kernel-rt-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: e7dbce880bc72b865ce290b504855172cf4bc849c953e9533a09febaf978e347
kernel-rt-debug-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 01985354ebcb627661841e6b0009882fd3864a1ecff20bb25fb6bbef5265a797
kernel-rt-debug-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 01985354ebcb627661841e6b0009882fd3864a1ecff20bb25fb6bbef5265a797
kernel-rt-debug-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: ea92e02d05682b268e14990f39849fb889bf132d610d94a1588b7a86ad4ebca8
kernel-rt-debug-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: ea92e02d05682b268e14990f39849fb889bf132d610d94a1588b7a86ad4ebca8
kernel-rt-debug-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 04fa1b4cc7629a4bebe3cc150e1552c98e439ed4de1894e2ea1314f95bb1b275
kernel-rt-debug-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 04fa1b4cc7629a4bebe3cc150e1552c98e439ed4de1894e2ea1314f95bb1b275
kernel-rt-debug-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 6c386fda68ad73e381d51205471da0fb6525d90f8d9fddcfd3df13724ae67831
kernel-rt-debug-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 6c386fda68ad73e381d51205471da0fb6525d90f8d9fddcfd3df13724ae67831
kernel-rt-debug-kvm-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: bdafa9fdca7478cd98e9a19b0fd4ec77fd9db190fbcac00a38c50dc149ea10bd
kernel-rt-debug-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 5a5d30d5c819c6808808d78bce3b8ef8dd55e3dbc0b87ba41ff4bac651728f99
kernel-rt-debug-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 5a5d30d5c819c6808808d78bce3b8ef8dd55e3dbc0b87ba41ff4bac651728f99
kernel-rt-debug-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 279619f2dd31d36f83953be26f50229dc864095d33d6400700b42e56585e7147
kernel-rt-debug-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 279619f2dd31d36f83953be26f50229dc864095d33d6400700b42e56585e7147
kernel-rt-debug-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 166cc84631c4f9324daa99292f131d63143434961af9bd5114321f7d53a6f5c3
kernel-rt-debug-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 166cc84631c4f9324daa99292f131d63143434961af9bd5114321f7d53a6f5c3
kernel-rt-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b31ac0c6d3e70de9aee3866ecb48b4b3a986fe0518d134f0b6c147c67024e61
kernel-rt-debuginfo-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b31ac0c6d3e70de9aee3866ecb48b4b3a986fe0518d134f0b6c147c67024e61
kernel-rt-debuginfo-common-x86_64-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: d161b7eae637a898879a5109d8301915a467177f1e49b635959dae0826ca1454
kernel-rt-debuginfo-common-x86_64-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: d161b7eae637a898879a5109d8301915a467177f1e49b635959dae0826ca1454
kernel-rt-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 25a245f078a55fa9a8351cbc00e0d3e21aee2dde4a169a4cb0913a3566fe326a
kernel-rt-devel-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 25a245f078a55fa9a8351cbc00e0d3e21aee2dde4a169a4cb0913a3566fe326a
kernel-rt-kvm-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 87d92f2b9aad2e664ed1932c49808a5ceb1b6c26aa25c8f418738595e7853755
kernel-rt-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: fd0c9fcaf6f3aa0b86d4751d0d41e347f811166ffbb9abc8646355d7aa533070
kernel-rt-modules-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: fd0c9fcaf6f3aa0b86d4751d0d41e347f811166ffbb9abc8646355d7aa533070
kernel-rt-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b67c01cd9471a9ee1697368106035980f1e02806315d22f91d0dccf30c8a009
kernel-rt-modules-core-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 8b67c01cd9471a9ee1697368106035980f1e02806315d22f91d0dccf30c8a009
kernel-rt-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 7d75c2f2ea4ec9794adea2c767cd4e52129f6c045da706a32d902cc048273798
kernel-rt-modules-extra-5.14.0-284.156.1.rt14.441.el9_2.x86_64.rpm SHA-256: 7d75c2f2ea4ec9794adea2c767cd4e52129f6c045da706a32d902cc048273798

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility