Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Red Hat Linux Kernel Security Update: Unauthorized Access Risk
RHSA-2026:3685
Summary
A security issue has been found in the Linux kernel used by Red Hat systems. This could allow an attacker to access sensitive system functions without permission, potentially leading to data theft or system compromise. Users should update their systems as soon as possible to patch the vulnerability and prevent unauthorized access.
What to do
- Update redhat bpftool to version 0:3.10.0-1160.147.1.el7.
- Update redhat bpftool-debuginfo to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-abi-whitelists to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-bootwrapper to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debug to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debug-debuginfo to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debug-devel to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debuginfo to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debuginfo-common-ppc64 to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debuginfo-common-ppc64le to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debuginfo-common-s390x to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-devel to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-doc to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-kdump to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-kdump-debuginfo to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-kdump-devel to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-tools to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-tools-debuginfo to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-tools-libs to version 0:3.10.0-1160.147.1.el7.
- Update redhat kernel-tools-libs-devel to version 0:3.10.0-1160.147.1.el7.
- Update redhat perf to version 0:3.10.0-1160.147.1.el7.
- Update redhat perf-debuginfo to version 0:3.10.0-1160.147.1.el7.
- Update redhat python-perf to version 0:3.10.0-1160.147.1.el7.
- Update redhat python-perf-debuginfo to version 0:3.10.0-1160.147.1.el7.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | bpftool | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | bpftool-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-abi-whitelists | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-bootwrapper | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debug | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debug-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debug-devel | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debuginfo-common-ppc64 | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debuginfo-common-s390x | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-devel | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-doc | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-kdump | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-kdump-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-kdump-devel | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-tools | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-tools-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-tools-libs | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | kernel-tools-libs-devel | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | perf | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | perf-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | python-perf | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
| redhat | python-perf-debuginfo | <= 0:3.10.0-1160.147.1.el7 | 0:3.10.0-1160.147.1.el7 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3685 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383404 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383487 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394601 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2395805 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2404121 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419837 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420347 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2424880 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436791 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3685.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-50673 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2022-50673 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-50673 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120947-CVE-2022-50673-f920@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38415 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38415 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38415 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38459 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38459 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38459 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38459-e941@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39760 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39760 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39760 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39817 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39817 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39817 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39817-90b7@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39993 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39993 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39993 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025101527-CVE-2025-39993-caef@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40271 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40271 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40271 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68349 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68349 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68349 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23074 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23074 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23074 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23074-6bb8@gregkh... Third Party Advisory
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026