Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.0

Red Hat Linux Patches Multiple Security Holes in the Linux Kernel

RHSA-2026:3886
Summary

Multiple patches for the Linux kernel have been released to address security vulnerabilities that could allow attackers to execute malicious code or elevate privileges. These patches are specifically for Red Hat Linux systems and should be applied to prevent potential attacks. Affected users should update their systems to the latest kernel patches.

What to do
  • Update redhat kpatch-patch-5_14_0-284_104_1 to version 0:1-13.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_104_1-debuginfo to version 0:1-13.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_104_1-debugsource to version 0:1-13.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_117_1 to version 0:1-10.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_117_1-debuginfo to version 0:1-10.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_117_1-debugsource to version 0:1-10.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_134_1 to version 0:1-4.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_134_1-debuginfo to version 0:1-4.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_134_1-debugsource to version 0:1-4.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_148_1 to version 0:1-2.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_148_1-debuginfo to version 0:1-2.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_148_1-debugsource to version 0:1-2.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_92_1 to version 0:1-15.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_92_1-debuginfo to version 0:1-15.el9_2.
  • Update redhat kpatch-patch-5_14_0-284_92_1-debugsource to version 0:1-15.el9_2.
Affected software
VendorProductAffected versionsFix available
redhat kpatch-patch-5_14_0-284_104_1 <= 0:1-13.el9_2 0:1-13.el9_2
redhat kpatch-patch-5_14_0-284_104_1-debuginfo <= 0:1-13.el9_2 0:1-13.el9_2
redhat kpatch-patch-5_14_0-284_104_1-debugsource <= 0:1-13.el9_2 0:1-13.el9_2
redhat kpatch-patch-5_14_0-284_117_1 <= 0:1-10.el9_2 0:1-10.el9_2
redhat kpatch-patch-5_14_0-284_117_1-debuginfo <= 0:1-10.el9_2 0:1-10.el9_2
redhat kpatch-patch-5_14_0-284_117_1-debugsource <= 0:1-10.el9_2 0:1-10.el9_2
redhat kpatch-patch-5_14_0-284_134_1 <= 0:1-4.el9_2 0:1-4.el9_2
redhat kpatch-patch-5_14_0-284_134_1-debuginfo <= 0:1-4.el9_2 0:1-4.el9_2
redhat kpatch-patch-5_14_0-284_134_1-debugsource <= 0:1-4.el9_2 0:1-4.el9_2
redhat kpatch-patch-5_14_0-284_148_1 <= 0:1-2.el9_2 0:1-2.el9_2
redhat kpatch-patch-5_14_0-284_148_1-debuginfo <= 0:1-2.el9_2 0:1-2.el9_2
redhat kpatch-patch-5_14_0-284_148_1-debugsource <= 0:1-2.el9_2 0:1-2.el9_2
redhat kpatch-patch-5_14_0-284_92_1 <= 0:1-15.el9_2 0:1-15.el9_2
redhat kpatch-patch-5_14_0-284_92_1-debuginfo <= 0:1-15.el9_2 0:1-15.el9_2
redhat kpatch-patch-5_14_0-284_92_1-debugsource <= 0:1-15.el9_2 0:1-15.el9_2
Original title
Red Hat Security Advisory: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_92_1 security update
osv CVSS3.1 7.0
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026