Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
Red Hat Linux Kernel Security Update: Privilege Escalation Risk
RHSA-2026:3360
Summary
A security update is available for the Red Hat Linux kernel. This update fixes a vulnerability that could allow an attacker to gain elevated privileges on the system. If you are using the Red Hat Linux kernel, you should update to the latest version to ensure your system remains secure.
What to do
- Update redhat bpftool to version 0:4.18.0-305.186.1.el8_4.
- Update redhat bpftool-debuginfo to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-abi-stablelists to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-core to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debug to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debug-core to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debug-debuginfo to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debug-devel to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debug-modules to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debug-modules-extra to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debuginfo to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-devel to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-doc to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-modules to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-modules-extra to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-tools to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-tools-debuginfo to version 0:4.18.0-305.186.1.el8_4.
- Update redhat kernel-tools-libs to version 0:4.18.0-305.186.1.el8_4.
- Update redhat perf to version 0:4.18.0-305.186.1.el8_4.
- Update redhat perf-debuginfo to version 0:4.18.0-305.186.1.el8_4.
- Update redhat python3-perf to version 0:4.18.0-305.186.1.el8_4.
- Update redhat python3-perf-debuginfo to version 0:4.18.0-305.186.1.el8_4.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | bpftool | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-core | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-core | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-devel | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-modules | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-devel | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-doc | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-modules | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-modules-extra | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-tools | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-tools-libs | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | perf | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | perf-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | python3-perf | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | bpftool | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-core | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-core | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-devel | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-modules | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-devel | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-doc | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-modules | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-modules-extra | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-tools | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | kernel-tools-libs | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | perf | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | perf-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | python3-perf | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-305.186.1.el8_4 | 0:4.18.0-305.186.1.el8_4 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.8
- https://access.redhat.com/errata/RHSA-2026:3360 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2373326 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383404 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383487 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394601 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2401432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2401510 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2401545 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2402193 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419837 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419870 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419902 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420329 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420347 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420366 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420376 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2424880 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2426226 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436791 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3360.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-50673 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2022-50673 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-50673 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120947-CVE-2022-50673-f920@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2022-50865 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2022-50865 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-50865 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50865-281e@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53539 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53539 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53539 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53581 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53581 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53581 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53581-80fa@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53673 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53673 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53673 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100706-CVE-2023-53673-36b9@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53821 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53821 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53821 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53821-9542@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53827 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53827 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53827 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120952-CVE-2023-53827-b045@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-53833 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53833 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53833 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120954-CVE-2023-53833-09d9@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38022 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38022 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38022 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2025-38022-41b3@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38415 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38415 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38415 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38459 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38459 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38459 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38459-e941@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39760 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39760 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39760 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39933 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39933 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39933 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40271 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40271 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40271 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40304 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40304 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40304 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40304-47b3@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40322 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40322 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40322 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40322-6355@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68349 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68349 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68349 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23074 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23074 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23074 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23074-6bb8@gregkh... Third Party Advisory
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026