Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.8

Red Hat Linux Kernel Security Update: Privilege Escalation Risk

RHSA-2026:3360
Summary

A security update is available for the Red Hat Linux kernel. This update fixes a vulnerability that could allow an attacker to gain elevated privileges on the system. If you are using the Red Hat Linux kernel, you should update to the latest version to ensure your system remains secure.

What to do
  • Update redhat bpftool to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat bpftool-debuginfo to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-abi-stablelists to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-core to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debug to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debug-core to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debug-debuginfo to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debug-devel to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debug-modules to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debug-modules-extra to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debuginfo to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-debuginfo-common-x86_64 to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-devel to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-doc to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-modules to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-modules-extra to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-tools to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-tools-debuginfo to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat kernel-tools-libs to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat perf to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat perf-debuginfo to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat python3-perf to version 0:4.18.0-305.186.1.el8_4.
  • Update redhat python3-perf-debuginfo to version 0:4.18.0-305.186.1.el8_4.
Affected software
VendorProductAffected versionsFix available
redhat bpftool <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat bpftool-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-abi-stablelists <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-core <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-core <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-devel <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-modules <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-modules-extra <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debuginfo-common-x86_64 <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-devel <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-doc <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-modules <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-modules-extra <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-tools <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-tools-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-tools-libs <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat perf <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat perf-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat python3-perf <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat python3-perf-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat bpftool <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat bpftool-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-abi-stablelists <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-core <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-core <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-devel <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-modules <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debug-modules-extra <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-debuginfo-common-x86_64 <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-devel <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-doc <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-modules <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-modules-extra <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-tools <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-tools-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat kernel-tools-libs <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat perf <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat perf-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat python3-perf <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
redhat python3-perf-debuginfo <= 0:4.18.0-305.186.1.el8_4 0:4.18.0-305.186.1.el8_4
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1 7.8
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026