Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Red Hat Linux Kernel: Privilege Escalation Vulnerability
RHSA-2026:3463
Summary
The Linux kernel in Red Hat Enterprise Linux has a flaw that could allow an attacker to get higher access rights on the system. This could happen if an attacker can exploit this flaw, they could gain control of the system. To fix this, update your system's kernel to the latest version.
What to do
- Update redhat kernel-rt to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-core to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug-core to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-devel to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-kvm to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-modules to version 0:4.18.0-553.109.1.rt7.450.el8_10.
- Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.109.1.rt7.450.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel-rt | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.109.1.rt7.450.el8_10 | 0:4.18.0-553.109.1.rt7.450.el8_10 |
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1
7.3
- https://access.redhat.com/errata/RHSA-2026:3463 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436802 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3463.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-23097 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23097 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23097 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026020427-CVE-2026-23097-a591@gregkh... Third Party Advisory
Published: 2 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026