[ALSA-2026:3463] Moderate: kernel-rt security update
Type:
security
Severity:
moderate
Release date:
2026-03-03
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: Linux kernel: Denial of Service due to a deadlock in hugetlb folio migration (CVE-2026-23097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-devel-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 019f9074a809ad4d7ede9550499321891c4ddc74bd1214eadafa3463249ea6de
x86_64 kernel-rt-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 0b85a56c2906d7a2ee43474ab941b4c316025e632b68223727f84b63015898f0
x86_64 kernel-rt-debug-core-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 116740fe18c112d4fae8f811c2db647dcc3974eea85e6c3f3550e73640f3c819
x86_64 kernel-rt-debug-devel-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 2bf2294b89c6bf3f63a4fc3521326896f085c24037d7e4e71a166c1411bde218
x86_64 kernel-rt-debug-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 2fe85d142ad7f0d9fdb9f3f05de1bc9844c8ba847a667ba1e561b50f5f0ec183
x86_64 kernel-rt-modules-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 30f007d1dd78441a39a4ab259c16f752aa2468a99da8cd522249543853dd0a0e
x86_64 kernel-rt-modules-extra-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 4fa2e079dcbc182e265e67e906535c30393823b9fd0f712ae02a081fc2ff5931
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 59442325d95e31793bbf24f5736293fa945281f66dfa3b3ff1d0707d72655680
x86_64 kernel-rt-core-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm 687259079c83ee3f6ace51e6231631e7e2b0ea561171c324b1450927fd5fda39
x86_64 kernel-rt-debug-modules-4.18.0-553.109.1.rt7.450.el8_10.x86_64.rpm f6a9caf27e61fcf7ed1b4c19a33bae5009e022026cd6c92010a6b2c69b82498f
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.