Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
Red Hat Linux Kernel Update Fixes Security Flaw
RHSA-2026:3963
Summary
This update fixes a security vulnerability in the Linux kernel used by Red Hat systems. If left unpatched, a remote attacker could potentially exploit this flaw to execute arbitrary code on affected systems. Red Hat recommends installing the latest kernel update to ensure system security.
What to do
- Update redhat bpftool to version 0:4.18.0-553.111.1.el8_10.
- Update redhat bpftool-debuginfo to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-abi-stablelists to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-core to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debug to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debug-core to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debug-debuginfo to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debug-devel to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debug-modules to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debug-modules-extra to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debuginfo to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debuginfo-common-aarch64 to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debuginfo-common-ppc64le to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debuginfo-common-s390x to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-devel to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-doc to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-modules to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-modules-extra to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-tools to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-tools-debuginfo to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-tools-libs to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-tools-libs-devel to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-zfcpdump to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-zfcpdump-core to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-zfcpdump-debuginfo to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-zfcpdump-devel to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-zfcpdump-modules to version 0:4.18.0-553.111.1.el8_10.
- Update redhat kernel-zfcpdump-modules-extra to version 0:4.18.0-553.111.1.el8_10.
- Update redhat perf to version 0:4.18.0-553.111.1.el8_10.
- Update redhat perf-debuginfo to version 0:4.18.0-553.111.1.el8_10.
- Update redhat python3-perf to version 0:4.18.0-553.111.1.el8_10.
- Update redhat python3-perf-debuginfo to version 0:4.18.0-553.111.1.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | bpftool | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-core | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-core | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-modules | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-s390x | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-doc | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-modules | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-modules-extra | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools-libs | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools-libs-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-core | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-modules | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | perf | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | perf-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | python3-perf | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | bpftool | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-core | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-core | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-modules | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-s390x | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-doc | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-modules | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-modules-extra | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools-libs | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-tools-libs-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-core | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-devel | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-modules | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | perf | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | perf-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | python3-perf | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-553.111.1.el8_10 | 0:4.18.0-553.111.1.el8_10 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.8
- https://access.redhat.com/errata/RHSA-2026:3963 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429026 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2432664 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3963.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-71085 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-71085 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-71085 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71085-e6c1@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23001 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23001 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23001 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026012534-CVE-2026-23001-7ab0@gregkh... Third Party Advisory
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026