https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2440219
https://bugzilla.redhat.com/show_bug.cgi?id=2442284
https://bugzilla.redhat.com/show_bug.cgi?id=2442287
https://bugzilla.redhat.com/show_bug.cgi?id=2442288
https://bugzilla.redhat.com/show_bug.cgi?id=2442290
https://bugzilla.redhat.com/show_bug.cgi?id=2442291
https://bugzilla.redhat.com/show_bug.cgi?id=2442292
https://bugzilla.redhat.com/show_bug.cgi?id=2442294
https://bugzilla.redhat.com/show_bug.cgi?id=2442295
https://bugzilla.redhat.com/show_bug.cgi?id=2442297
https://bugzilla.redhat.com/show_bug.cgi?id=2442298
https://bugzilla.redhat.com/show_bug.cgi?id=2442300
https://bugzilla.redhat.com/show_bug.cgi?id=2442302
https://bugzilla.redhat.com/show_bug.cgi?id=2442304
https://bugzilla.redhat.com/show_bug.cgi?id=2442307
https://bugzilla.redhat.com/show_bug.cgi?id=2442308
https://bugzilla.redhat.com/show_bug.cgi?id=2442309
https://bugzilla.redhat.com/show_bug.cgi?id=2442312
https://bugzilla.redhat.com/show_bug.cgi?id=2442313
https://bugzilla.redhat.com/show_bug.cgi?id=2442314
https://bugzilla.redhat.com/show_bug.cgi?id=2442316
https://bugzilla.redhat.com/show_bug.cgi?id=2442318
https://bugzilla.redhat.com/show_bug.cgi?id=2442319
https://bugzilla.redhat.com/show_bug.cgi?id=2442320
https://bugzilla.redhat.com/show_bug.cgi?id=2442322
https://bugzilla.redhat.com/show_bug.cgi?id=2442324
https://bugzilla.redhat.com/show_bug.cgi?id=2442325
https://bugzilla.redhat.com/show_bug.cgi?id=2442326
https://bugzilla.redhat.com/show_bug.cgi?id=2442327
https://bugzilla.redhat.com/show_bug.cgi?id=2442328
https://bugzilla.redhat.com/show_bug.cgi?id=2442329
https://bugzilla.redhat.com/show_bug.cgi?id=2442331
https://bugzilla.redhat.com/show_bug.cgi?id=2442333
https://bugzilla.redhat.com/show_bug.cgi?id=2442334
https://bugzilla.redhat.com/show_bug.cgi?id=2442335
https://bugzilla.redhat.com/show_bug.cgi?id=2442337
https://bugzilla.redhat.com/show_bug.cgi?id=2442342
https://bugzilla.redhat.com/show_bug.cgi?id=2442343
Severity: Critical
ID: 299964
File Name: redhat-RHSA-2026-3361.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 2/25/2026
Updated: 2/25/2026
Supported Sensors: Continuous Assessment, Nessus Agent, Nessus
Risk Factor: High
Score: 8.4
Vendor Severity: Important
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2026-2790
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2026-2778
CPE: cpe:/o:redhat:enterprise_linux:10.1, p-cpe:/a:redhat:enterprise_linux:firefox
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 2/25/2026
Vulnerability Publication Date: 2/16/2026
CVE: CVE-2026-2447, CVE-2026-2757, CVE-2026-2758, CVE-2026-2759, CVE-2026-2760, CVE-2026-2761, CVE-2026-2762, CVE-2026-2763, CVE-2026-2764, CVE-2026-2765, CVE-2026-2766, CVE-2026-2767, CVE-2026-2768, CVE-2026-2769, CVE-2026-2770, CVE-2026-2771, CVE-2026-2772, CVE-2026-2773, CVE-2026-2774, CVE-2026-2775, CVE-2026-2776, CVE-2026-2777, CVE-2026-2778, CVE-2026-2779, CVE-2026-2780, CVE-2026-2781, CVE-2026-2782, CVE-2026-2783, CVE-2026-2784, CVE-2026-2785, CVE-2026-2786, CVE-2026-2787, CVE-2026-2788, CVE-2026-2789, CVE-2026-2790, CVE-2026-2791, CVE-2026-2792, CVE-2026-2793
RHSA: 2026:3361