Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.0
Linux Kernel Vulnerability in Red Hat Enterprise Linux
RHSA-2026:3873
Summary
A security update is available for Red Hat Enterprise Linux. This update fixes multiple vulnerabilities in the kernel that could allow an attacker to bypass security restrictions or execute malicious code. Affected users should update their systems as soon as possible to prevent potential security risks.
What to do
- Update redhat kpatch-patch-5_14_0-70_121_1 to version 0:1-13.el9_0.
- Update redhat kpatch-patch-5_14_0-70_121_1-debuginfo to version 0:1-13.el9_0.
- Update redhat kpatch-patch-5_14_0-70_121_1-debugsource to version 0:1-13.el9_0.
- Update redhat kpatch-patch-5_14_0-70_124_1 to version 0:1-11.el9_0.
- Update redhat kpatch-patch-5_14_0-70_124_1-debuginfo to version 0:1-11.el9_0.
- Update redhat kpatch-patch-5_14_0-70_124_1-debugsource to version 0:1-11.el9_0.
- Update redhat kpatch-patch-5_14_0-70_132_1 to version 0:1-7.el9_0.
- Update redhat kpatch-patch-5_14_0-70_132_1-debuginfo to version 0:1-7.el9_0.
- Update redhat kpatch-patch-5_14_0-70_132_1-debugsource to version 0:1-7.el9_0.
- Update redhat kpatch-patch-5_14_0-70_144_1 to version 0:1-3.el9_0.
- Update redhat kpatch-patch-5_14_0-70_144_1-debuginfo to version 0:1-3.el9_0.
- Update redhat kpatch-patch-5_14_0-70_144_1-debugsource to version 0:1-3.el9_0.
- Update redhat kpatch-patch-5_14_0-70_155_1 to version 0:1-2.el9_0.
- Update redhat kpatch-patch-5_14_0-70_155_1-debuginfo to version 0:1-2.el9_0.
- Update redhat kpatch-patch-5_14_0-70_155_1-debugsource to version 0:1-2.el9_0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kpatch-patch-5_14_0-70_121_1 | <= 0:1-13.el9_0 | 0:1-13.el9_0 |
| redhat | kpatch-patch-5_14_0-70_121_1-debuginfo | <= 0:1-13.el9_0 | 0:1-13.el9_0 |
| redhat | kpatch-patch-5_14_0-70_121_1-debugsource | <= 0:1-13.el9_0 | 0:1-13.el9_0 |
| redhat | kpatch-patch-5_14_0-70_124_1 | <= 0:1-11.el9_0 | 0:1-11.el9_0 |
| redhat | kpatch-patch-5_14_0-70_124_1-debuginfo | <= 0:1-11.el9_0 | 0:1-11.el9_0 |
| redhat | kpatch-patch-5_14_0-70_124_1-debugsource | <= 0:1-11.el9_0 | 0:1-11.el9_0 |
| redhat | kpatch-patch-5_14_0-70_132_1 | <= 0:1-7.el9_0 | 0:1-7.el9_0 |
| redhat | kpatch-patch-5_14_0-70_132_1-debuginfo | <= 0:1-7.el9_0 | 0:1-7.el9_0 |
| redhat | kpatch-patch-5_14_0-70_132_1-debugsource | <= 0:1-7.el9_0 | 0:1-7.el9_0 |
| redhat | kpatch-patch-5_14_0-70_144_1 | <= 0:1-3.el9_0 | 0:1-3.el9_0 |
| redhat | kpatch-patch-5_14_0-70_144_1-debuginfo | <= 0:1-3.el9_0 | 0:1-3.el9_0 |
| redhat | kpatch-patch-5_14_0-70_144_1-debugsource | <= 0:1-3.el9_0 | 0:1-3.el9_0 |
| redhat | kpatch-patch-5_14_0-70_155_1 | <= 0:1-2.el9_0 | 0:1-2.el9_0 |
| redhat | kpatch-patch-5_14_0-70_155_1-debuginfo | <= 0:1-2.el9_0 | 0:1-2.el9_0 |
| redhat | kpatch-patch-5_14_0-70_155_1-debugsource | <= 0:1-2.el9_0 | 0:1-2.el9_0 |
Original title
Red Hat Security Advisory: kpatch-patch-5_14_0-70_121_1, kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, kpatch-patch-5_14_0-70_144_1, and kpatch-patch-5_14_0-70_155_1 security update
osv CVSS3.1
7.0
- https://access.redhat.com/errata/RHSA-2026:3873 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418872 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3873.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-40248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh... Third Party Advisory
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026