Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:3358 - Security Advisory
Issued:
2026-02-25
Updated:
2026-02-25

RHSA-2026:3358 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: Linux kernel: xHCI driver isochronous event handling race condition leading to data loss or UAF (CVE-2025-37882)
  • kernel: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (CVE-2025-37861)
  • kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415)
  • kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760)
  • kernel: Linux kernel: Out-of-bounds write in VXLAN due to incorrect nexthop hash size leading to denial of service (CVE-2023-53192)
  • kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)
  • kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271)
  • kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling (CVE-2023-53762)
  • kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service (CVE-2025-40269)
  • kernel: ip6_vti: fix slab-use-after-free in decode_session6 (CVE-2023-53821)
  • kernel: ext4: fix use-after-free in ext4_orphan_cleanup (CVE-2022-50673)
  • kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (CVE-2025-68349)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2365250 - CVE-2025-37882 kernel: Linux kernel: xHCI driver isochronous event handling race condition leading to data loss or UAF
  • BZ - 2365256 - CVE-2025-37861 kernel: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue
  • BZ - 2383404 - CVE-2025-38415 kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation
  • BZ - 2394601 - CVE-2025-39760 kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing
  • BZ - 2395232 - CVE-2023-53192 kernel: Linux kernel: Out-of-bounds write in VXLAN due to incorrect nexthop hash size leading to denial of service
  • BZ - 2401432 - CVE-2025-39933 kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
  • BZ - 2419837 - CVE-2025-40271 kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.
  • BZ - 2419838 - CVE-2023-53762 kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling
  • BZ - 2419919 - CVE-2025-40269 kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service
  • BZ - 2420329 - CVE-2023-53821 kernel: ip6_vti: fix slab-use-after-free in decode_session6
  • BZ - 2420347 - CVE-2022-50673 kernel: ext4: fix use-after-free in ext4_orphan_cleanup
  • BZ - 2424880 - CVE-2025-68349 kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid

CVEs

  • CVE-2022-50673
  • CVE-2023-53192
  • CVE-2023-53762
  • CVE-2023-53821
  • CVE-2025-37861
  • CVE-2025-37882
  • CVE-2025-38415
  • CVE-2025-39760
  • CVE-2025-39933
  • CVE-2025-40269
  • CVE-2025-40271
  • CVE-2025-68349

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kernel-rt-5.14.0-284.158.1.rt14.443.el9_2.src.rpm SHA-256: b347ebb0bb31dafa820e1751c8f1412fb3e8714b92419f8e30162a034e525c00
x86_64
kernel-rt-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 34b8c77c2ad1334bc5faafd559a25c850dd15c22a2d88405218e5a6a7c362e4e
kernel-rt-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 34b8c77c2ad1334bc5faafd559a25c850dd15c22a2d88405218e5a6a7c362e4e
kernel-rt-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 886965a805964d4fa6659979a69afc6e67659030bedd382f38e77a6ec9993aa5
kernel-rt-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 886965a805964d4fa6659979a69afc6e67659030bedd382f38e77a6ec9993aa5
kernel-rt-debug-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: c6d03dcf46c35ebf642a51604544b1184fdc64cf2f0a5c1e9234116e21a364f5
kernel-rt-debug-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: c6d03dcf46c35ebf642a51604544b1184fdc64cf2f0a5c1e9234116e21a364f5
kernel-rt-debug-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: a62ed980da5bcaef403bbce9866bedc203c85db554ab5306392fe9022569588e
kernel-rt-debug-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: a62ed980da5bcaef403bbce9866bedc203c85db554ab5306392fe9022569588e
kernel-rt-debug-debuginfo-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: fc375b6e42e8afcc7fbbbb7756fef288b60263662b2fc75c1e967c12448e276d
kernel-rt-debug-debuginfo-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: fc375b6e42e8afcc7fbbbb7756fef288b60263662b2fc75c1e967c12448e276d
kernel-rt-debug-devel-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 876338a60a1f264ea7d23501668b7055f9e3f4d562b0b0c871ec8f4756f7acaf
kernel-rt-debug-devel-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 876338a60a1f264ea7d23501668b7055f9e3f4d562b0b0c871ec8f4756f7acaf
kernel-rt-debug-kvm-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 77ab99a586b7d0a2ebf5228c87e5dbceb80359b50158ddbeb03bc3afc7c1ac6f
kernel-rt-debug-modules-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: d77a61439f26c5abb0a4360e353358928f746cd3f0e3c07d42903977d1c5bc26
kernel-rt-debug-modules-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: d77a61439f26c5abb0a4360e353358928f746cd3f0e3c07d42903977d1c5bc26
kernel-rt-debug-modules-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 336320015485a5b094d08bb1b2ac991fa4201a4c0057533373d4f529190ed44c
kernel-rt-debug-modules-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 336320015485a5b094d08bb1b2ac991fa4201a4c0057533373d4f529190ed44c
kernel-rt-debug-modules-extra-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 793944efa75b9833337a5618351f5ac28f5bd7177963c37051753fa69030760b
kernel-rt-debug-modules-extra-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 793944efa75b9833337a5618351f5ac28f5bd7177963c37051753fa69030760b
kernel-rt-debuginfo-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 384b3e2d787d888138b8fc778fb791267abfec8c2a14caec2ee9c368d5e1df34
kernel-rt-debuginfo-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 384b3e2d787d888138b8fc778fb791267abfec8c2a14caec2ee9c368d5e1df34
kernel-rt-debuginfo-common-x86_64-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 1e3ed735dccfd9e004a21598fce1981bdc5fb32ca0bc6b759c5d07a27504ddef
kernel-rt-debuginfo-common-x86_64-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 1e3ed735dccfd9e004a21598fce1981bdc5fb32ca0bc6b759c5d07a27504ddef
kernel-rt-devel-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: f2fcc90da0a332081bd840f123c546dba7fb381f1562608781a7ef6e73c9a48c
kernel-rt-devel-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: f2fcc90da0a332081bd840f123c546dba7fb381f1562608781a7ef6e73c9a48c
kernel-rt-kvm-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 871ade0063a341d678b1d4b241d030dbe46c49a1162fa1999616f448a43f7446
kernel-rt-modules-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 2f1af741359a6a4fda7805aedc765ad89b8c6aa981680570bdf95cdfa68f5967
kernel-rt-modules-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 2f1af741359a6a4fda7805aedc765ad89b8c6aa981680570bdf95cdfa68f5967
kernel-rt-modules-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: ab96f9ad5dc9a3eb6e0223694e4ec0f95f05a66c15f79b00175bdbe78de618ee
kernel-rt-modules-core-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: ab96f9ad5dc9a3eb6e0223694e4ec0f95f05a66c15f79b00175bdbe78de618ee
kernel-rt-modules-extra-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 5804a01d5968d18a2b3713f68b334be172937e26451085fde858befb8c471014
kernel-rt-modules-extra-5.14.0-284.158.1.rt14.443.el9_2.x86_64.rpm SHA-256: 5804a01d5968d18a2b3713f68b334be172937e26451085fde858befb8c471014

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility