Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Red Hat Kernel RT Security Update Exposes Systems to Root Access
RHSA-2026:2821
Summary
An update is available for the Red Hat kernel for real-time systems. This update addresses a security issue that could allow an attacker to gain root access to the system. To protect your system, apply this update as soon as possible.
What to do
- Update redhat kernel-rt to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-core to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug-core to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug-debuginfo to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug-devel to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug-kvm to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug-modules to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debug-modules-extra to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debuginfo to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-debuginfo-common-x86_64 to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-devel to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-kvm to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-modules to version 0:4.18.0-553.105.1.rt7.446.el8_10.
- Update redhat kernel-rt-modules-extra to version 0:4.18.0-553.105.1.rt7.446.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel-rt | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-core | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-core | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-debuginfo | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-devel | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-kvm | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-modules | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debug-modules-extra | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debuginfo | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-debuginfo-common-x86_64 | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-devel | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-kvm | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-modules | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
| redhat | kernel-rt-modules-extra | <= 0:4.18.0-553.105.1.rt7.446.el8_10 | 0:4.18.0-553.105.1.rt7.446.el8_10 |
Original title
Red Hat Security Advisory: kernel-rt security update
osv CVSS3.1
7.3
- https://access.redhat.com/errata/RHSA-2026:2821 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2414482 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419838 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419870 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2821.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-53762 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53762 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53762 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40168 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40168 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40168 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40304 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40304 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40304 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40304-47b3@gregkh... Third Party Advisory
Published: 18 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026