[ALSA-2026:1661] Moderate: kernel-rt security update
Type:
security
Severity:
moderate
Release date:
2026-02-02
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error (CVE-2024-26766) * kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022) * kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution (CVE-2025-38024) * kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415) * kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion (CVE-2025-38459) * kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760) * kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258) * kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271) * kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322) * kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() (CVE-2022-50865) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-debug-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 1f0ff35ceef09658011ac987aaf5f1ddb75dab4ab376ac568a5c2bae1977a4a3
x86_64 kernel-rt-core-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 2e36d2566e4b54429a2c9ce2ea70deb8581a433f137e32b4f47a3c244120166e
x86_64 kernel-rt-modules-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 2e7d17e0381dbabf6869b83e9d13fabb61371bd63a9cf63428f84775fa5379b3
x86_64 kernel-rt-devel-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 4ca92854d67427c14ad1926a22e4141f7e8581f527f8d81de2f0b03364945ab7
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 5009801a6be042c1a2cabe4dea1c36cd7d0a36721c81aacaef78c3df0cd8c60b
x86_64 kernel-rt-debug-modules-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 57424b91d60f5fa44a1a2d3bb30bee10e85b274673791e8adae1e2d2eb3d8865
x86_64 kernel-rt-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 5a51d724a85ef5e3655d20db0920147168ab3931fbfda0de73bb89c5bbede44e
x86_64 kernel-rt-debug-devel-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm 802d3894d4d1ce37a2da05d1c423b54cc143301e28abbcba6a2e5221a56be512
x86_64 kernel-rt-debug-core-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm a8cc0b3aa81db726a965c09b0228c3e7e1e974ae353c3eb287750db89b067edb
x86_64 kernel-rt-modules-extra-4.18.0-553.100.1.rt7.441.el8_10.x86_64.rpm ca3a3734bfadb06b445023f7fae7173b1d14b72a1022d10eb7d21cc88346db0b
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.