Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.3

Red Hat Linux Kernel Real-Time Module Security Update

RHSA-2026:3110
Summary

A security update is available for the Red Hat Linux kernel real-time module. This update fixes a weakness in the kernel that could allow an attacker to potentially elevate privileges. Red Hat recommends updating the kernel to fix this issue.

What to do
  • Update redhat kernel-rt to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-core to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug-core to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-devel to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-kvm to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-modules to version 0:4.18.0-553.107.1.rt7.448.el8_10.
  • Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.107.1.rt7.448.el8_10.
Affected software
VendorProductAffected versionsFix available
redhat kernel-rt <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-core <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-core <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-debuginfo <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-devel <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-kvm <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-modules <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-modules-extra <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debuginfo <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debuginfo-common-x86_64 <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-devel <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-kvm <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-modules <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-modules-extra <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-core <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-core <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-debuginfo <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-devel <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-kvm <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-modules <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debug-modules-extra <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debuginfo <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-debuginfo-common-x86_64 <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-devel <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-kvm <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-modules <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
redhat kernel-rt-modules-extra <= 0:4.18.0-553.107.1.rt7.448.el8_10 0:4.18.0-553.107.1.rt7.448.el8_10
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1 7.3
Published: 24 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026