Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Red Hat Linux Kernel: Remote Code Execution Risk
RHSA-2026:3083
Summary
A security update is available for the Linux kernel on Red Hat systems. This update fixes a critical vulnerability that could allow an attacker to execute malicious code on a system, potentially gaining unauthorized access. Users should apply the update to ensure their systems are secure.
What to do
- Update redhat bpftool to version 0:4.18.0-553.107.1.el8_10.
- Update redhat bpftool-debuginfo to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-abi-stablelists to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-core to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debug to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debug-core to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debug-debuginfo to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debug-devel to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debug-modules to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debug-modules-extra to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debuginfo to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debuginfo-common-aarch64 to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debuginfo-common-ppc64le to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debuginfo-common-s390x to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-devel to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-doc to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-modules to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-modules-extra to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-tools to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-tools-debuginfo to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-tools-libs to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-tools-libs-devel to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-zfcpdump to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-zfcpdump-core to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-zfcpdump-debuginfo to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-zfcpdump-devel to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-zfcpdump-modules to version 0:4.18.0-553.107.1.el8_10.
- Update redhat kernel-zfcpdump-modules-extra to version 0:4.18.0-553.107.1.el8_10.
- Update redhat perf to version 0:4.18.0-553.107.1.el8_10.
- Update redhat perf-debuginfo to version 0:4.18.0-553.107.1.el8_10.
- Update redhat python3-perf to version 0:4.18.0-553.107.1.el8_10.
- Update redhat python3-perf-debuginfo to version 0:4.18.0-553.107.1.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | bpftool | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-core | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-core | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-modules | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-s390x | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-doc | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-modules | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-modules-extra | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools-libs | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools-libs-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-core | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-modules | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | perf | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | perf-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | python3-perf | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | bpftool | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | bpftool-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-abi-stablelists | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-core | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-core | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-modules | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debug-modules-extra | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-s390x | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-doc | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-modules | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-modules-extra | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools-libs | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-tools-libs-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-core | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-devel | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-modules | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | perf | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | perf-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | python3-perf | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
| redhat | python3-perf-debuginfo | <= 0:4.18.0-553.107.1.el8_10 | 0:4.18.0-553.107.1.el8_10 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.3
- https://access.redhat.com/errata/RHSA-2026:3083 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2376034 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2378981 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2406747 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429065 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436791 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3083.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-38129 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38129 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38129 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38129-3c0e@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38248-003c@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40064 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40064 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40064 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68800 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68800 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68800 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68800-39d2@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23074 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23074 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23074 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23074-6bb8@gregkh... Third Party Advisory
Published: 24 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026