[ALSA-2026:16196] Important: kernel-rt security update
Type:
security
Severity:
important
Release date:
2026-05-13
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: "Dirty Frag" is a new universal Local Privilege Escalation (LPE) vulnerability in the Linux kernel (CVE-2026-43284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 077d02977531ffd39f6cf7dbc4313870dec7fc9371d66688a0dbfc53cc7c65f2
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 0d0b394cc01f51733a126aa72c45762018067b3e1477e8668112156ed5fdc351
x86_64 kernel-rt-debug-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 270180f7b82e07d3978d5809c44488299f3ee053f970efe746343239b11ac6b9
x86_64 kernel-rt-modules-extra-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 2820ac18c7298480836cc4e4184f72655e76feaa465db3a182d704c7f6f0bfe6
x86_64 kernel-rt-debug-modules-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 56f297578f45556cf626fc9a687e169d0d33822f22f95067869b3c27eda5cb75
x86_64 kernel-rt-debug-core-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 6e5e80d7284c5bccc723619d0f7f585635b7a9ee510f8afd9710bb4d0b1be481
x86_64 kernel-rt-debug-devel-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm 76f20f00f8b40547a7acb07c9d178de8dd077dcebbd6c6a459fdb4325c22f6c5
x86_64 kernel-rt-core-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm a66515cc66cfbc9d78930af736fbfc55ff049efa9a0846721cbc28892d4e1274
x86_64 kernel-rt-devel-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm b681667273fa710bf6291362a8fb42adee25000a50c4914806cb8ff7f5a3d6e9
x86_64 kernel-rt-modules-4.18.0-553.124.1.rt7.465.el8_10.x86_64.rpm ea94a263eef6248e03e9b7bc407c6eeb6957157023b2b7f814d0ff562cac15fb
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.