Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Red Hat Linux Kernel Security Update: Unpatched Vulnerability Exposes System to Attack
RHSA-2026:2720
Summary
A security update is available for the Red Hat Linux kernel. This update addresses a critical vulnerability that could allow an attacker to execute arbitrary code on a system. It is recommended that all affected systems be updated as soon as possible to prevent potential exploitation.
What to do
- Update redhat bpftool to version 0:4.18.0-553.105.1.el8_10.
- Update redhat bpftool-debuginfo to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-abi-stablelists to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-core to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debug to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debug-core to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debug-debuginfo to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debug-devel to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debug-modules to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debug-modules-extra to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debuginfo to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debuginfo-common-aarch64 to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debuginfo-common-ppc64le to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debuginfo-common-s390x to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-devel to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-doc to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-modules to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-modules-extra to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-tools to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-tools-debuginfo to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-tools-libs to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-tools-libs-devel to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-zfcpdump to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-zfcpdump-core to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-zfcpdump-debuginfo to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-zfcpdump-devel to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-zfcpdump-modules to version 0:4.18.0-553.105.1.el8_10.
- Update redhat kernel-zfcpdump-modules-extra to version 0:4.18.0-553.105.1.el8_10.
- Update redhat perf to version 0:4.18.0-553.105.1.el8_10.
- Update redhat perf-debuginfo to version 0:4.18.0-553.105.1.el8_10.
- Update redhat python3-perf to version 0:4.18.0-553.105.1.el8_10.
- Update redhat python3-perf-debuginfo to version 0:4.18.0-553.105.1.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | bpftool | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-core | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-core | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-modules | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-s390x | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-doc | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-modules | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-modules-extra | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools-libs | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools-libs-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-core | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-modules | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | perf | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | perf-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | python3-perf | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | bpftool | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-core | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-core | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-modules | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-s390x | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-doc | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-modules | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-modules-extra | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools-libs | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-tools-libs-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-core | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-devel | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-modules | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | perf | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | perf-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | python3-perf | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-553.105.1.el8_10 | 0:4.18.0-553.105.1.el8_10 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.3
- https://access.redhat.com/errata/RHSA-2026:2720 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2414482 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419838 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419870 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2720.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-53762 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53762 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53762 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40168 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40168 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40168 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40304 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40304 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40304 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40304-47b3@gregkh... Third Party Advisory
Published: 17 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026