Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Red Hat Linux Kernel Real-Time Module Security Update
RHSA-2026:3110
Summary
A security update is available for the Red Hat Linux kernel real-time module. This update fixes a weakness in the kernel that could allow an attacker to potentially elevate privileges. Red Hat recommends updating the kernel to fix this issue.
What to do
- Update redhat kernel-rt to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-core to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug-core to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-devel to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-kvm to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-modules to version 0:4.18.0-553.107.1.rt7.448.el8_10.
- Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.107.1.rt7.448.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel-rt | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.107.1.rt7.448.el8_10 | 0:4.18.0-553.107.1.rt7.448.el8_10 |
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1
7.3
- https://access.redhat.com/errata/RHSA-2026:3110 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2376034 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2378981 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2406747 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429065 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436791 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3110.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-38129 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38129 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38129 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38129-3c0e@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38248-003c@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40064 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40064 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40064 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68800 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68800 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68800 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68800-39d2@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23074 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23074 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23074 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23074-6bb8@gregkh... Third Party Advisory
Published: 24 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026