Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.0

Linux Kernel Vulnerability in Red Hat Enterprise Linux

RHSA-2026:3873
Summary

A security update is available for Red Hat Enterprise Linux. This update fixes multiple vulnerabilities in the kernel that could allow an attacker to bypass security restrictions or execute malicious code. Affected users should update their systems as soon as possible to prevent potential security risks.

What to do
  • Update redhat kpatch-patch-5_14_0-70_121_1 to version 0:1-13.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_121_1-debuginfo to version 0:1-13.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_121_1-debugsource to version 0:1-13.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_124_1 to version 0:1-11.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_124_1-debuginfo to version 0:1-11.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_124_1-debugsource to version 0:1-11.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_132_1 to version 0:1-7.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_132_1-debuginfo to version 0:1-7.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_132_1-debugsource to version 0:1-7.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_144_1 to version 0:1-3.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_144_1-debuginfo to version 0:1-3.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_144_1-debugsource to version 0:1-3.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_155_1 to version 0:1-2.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_155_1-debuginfo to version 0:1-2.el9_0.
  • Update redhat kpatch-patch-5_14_0-70_155_1-debugsource to version 0:1-2.el9_0.
Affected software
VendorProductAffected versionsFix available
redhat kpatch-patch-5_14_0-70_121_1 <= 0:1-13.el9_0 0:1-13.el9_0
redhat kpatch-patch-5_14_0-70_121_1-debuginfo <= 0:1-13.el9_0 0:1-13.el9_0
redhat kpatch-patch-5_14_0-70_121_1-debugsource <= 0:1-13.el9_0 0:1-13.el9_0
redhat kpatch-patch-5_14_0-70_124_1 <= 0:1-11.el9_0 0:1-11.el9_0
redhat kpatch-patch-5_14_0-70_124_1-debuginfo <= 0:1-11.el9_0 0:1-11.el9_0
redhat kpatch-patch-5_14_0-70_124_1-debugsource <= 0:1-11.el9_0 0:1-11.el9_0
redhat kpatch-patch-5_14_0-70_132_1 <= 0:1-7.el9_0 0:1-7.el9_0
redhat kpatch-patch-5_14_0-70_132_1-debuginfo <= 0:1-7.el9_0 0:1-7.el9_0
redhat kpatch-patch-5_14_0-70_132_1-debugsource <= 0:1-7.el9_0 0:1-7.el9_0
redhat kpatch-patch-5_14_0-70_144_1 <= 0:1-3.el9_0 0:1-3.el9_0
redhat kpatch-patch-5_14_0-70_144_1-debuginfo <= 0:1-3.el9_0 0:1-3.el9_0
redhat kpatch-patch-5_14_0-70_144_1-debugsource <= 0:1-3.el9_0 0:1-3.el9_0
redhat kpatch-patch-5_14_0-70_155_1 <= 0:1-2.el9_0 0:1-2.el9_0
redhat kpatch-patch-5_14_0-70_155_1-debuginfo <= 0:1-2.el9_0 0:1-2.el9_0
redhat kpatch-patch-5_14_0-70_155_1-debugsource <= 0:1-2.el9_0 0:1-2.el9_0
Original title
Red Hat Security Advisory: kpatch-patch-5_14_0-70_121_1, kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, kpatch-patch-5_14_0-70_144_1, and kpatch-patch-5_14_0-70_155_1 security update
osv CVSS3.1 7.0
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026