Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
Red Hat Linux Kernel RT: Privilege Escalation Risk
RHSA-2026:3964
Summary
A security update is available for Red Hat Linux Kernel RT to fix a vulnerability that could allow an attacker to gain elevated privileges on a system, potentially leading to unauthorized access. This update is important for all users running Red Hat Linux Kernel RT. We recommend applying the update as soon as possible to ensure the security of your system.
What to do
- Update redhat kernel-rt to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-core to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug-core to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-devel to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-kvm to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-modules to version 0:4.18.0-553.111.1.rt7.452.el8_10.
- Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.111.1.rt7.452.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel-rt | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.111.1.rt7.452.el8_10 | 0:4.18.0-553.111.1.rt7.452.el8_10 |
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1
7.8
- https://access.redhat.com/errata/RHSA-2026:3964 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429026 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2432664 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3964.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-71085 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-71085 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-71085 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71085-e6c1@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23001 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23001 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23001 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026012534-CVE-2026-23001-7ab0@gregkh... Third Party Advisory
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026