Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.3

Red Hat Linux Kernel: Privilege Escalation Vulnerability

RHSA-2026:3463
Summary

The Linux kernel in Red Hat Enterprise Linux has a flaw that could allow an attacker to get higher access rights on the system. This could happen if an attacker can exploit this flaw, they could gain control of the system. To fix this, update your system's kernel to the latest version.

What to do
  • Update redhat kernel-rt to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-core to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug-core to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-devel to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-kvm to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-modules to version 0:4.18.0-553.109.1.rt7.450.el8_10.
  • Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.109.1.rt7.450.el8_10.
Affected software
VendorProductAffected versionsFix available
redhat kernel-rt <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-core <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-core <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-debuginfo <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-devel <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-kvm <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-modules <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-modules-extra <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debuginfo <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debuginfo-common-x86_64 <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-devel <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-kvm <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-modules <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-modules-extra <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-core <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-core <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-debuginfo <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-devel <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-kvm <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-modules <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debug-modules-extra <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debuginfo <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-debuginfo-common-x86_64 <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-devel <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-kvm <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-modules <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
redhat kernel-rt-modules-extra <= 0:4.18.0-553.109.1.rt7.450.el8_10 0:4.18.0-553.109.1.rt7.450.el8_10
Published: 2 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026