Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.8

Red Hat Linux Kernel RT: Privilege Escalation Risk

RHSA-2026:3964
Summary

A security update is available for Red Hat Linux Kernel RT to fix a vulnerability that could allow an attacker to gain elevated privileges on a system, potentially leading to unauthorized access. This update is important for all users running Red Hat Linux Kernel RT. We recommend applying the update as soon as possible to ensure the security of your system.

What to do
  • Update redhat kernel-rt to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-core to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug-core to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-devel to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-kvm to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-modules to version 0:4.18.0-553.111.1.rt7.452.el8_10.
  • Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.111.1.rt7.452.el8_10.
Affected software
VendorProductAffected versionsFix available
redhat kernel-rt <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-core <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-core <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-debuginfo <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-devel <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-kvm <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-modules <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-modules-extra <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debuginfo <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debuginfo-common-x86_64 <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-devel <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-kvm <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-modules <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-modules-extra <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-core <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-core <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-debuginfo <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-devel <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-kvm <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-modules <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debug-modules-extra <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debuginfo <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-debuginfo-common-x86_64 <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-devel <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-kvm <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-modules <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
redhat kernel-rt-modules-extra <= 0:4.18.0-553.111.1.rt7.452.el8_10 0:4.18.0-553.111.1.rt7.452.el8_10
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026