Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Red Hat Linux Kernel Security Update Exposes System to Privilege Escalation
RHSA-2026:3293
Summary
A security update is available for the Linux kernel on Red Hat systems. This update addresses a vulnerability that could potentially allow an attacker to gain elevated privileges on the system. To protect your system, apply the available update as soon as possible.
What to do
- Update redhat bpftool to version 0:5.14.0-70.167.1.el9_0.
- Update redhat bpftool-debuginfo to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-abi-stablelists to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-core to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug-core to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug-debuginfo to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug-devel to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug-devel-matched to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug-modules to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debug-modules-extra to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debuginfo to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debuginfo-common-aarch64 to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debuginfo-common-ppc64le to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debuginfo-common-s390x to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-devel to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-devel-matched to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-doc to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-modules to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-modules-extra to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-tools to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-tools-debuginfo to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-tools-libs to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump-core to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump-debuginfo to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump-devel to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump-devel-matched to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump-modules to version 0:5.14.0-70.167.1.el9_0.
- Update redhat kernel-zfcpdump-modules-extra to version 0:5.14.0-70.167.1.el9_0.
- Update redhat perf to version 0:5.14.0-70.167.1.el9_0.
- Update redhat perf-debuginfo to version 0:5.14.0-70.167.1.el9_0.
- Update redhat python3-perf to version 0:5.14.0-70.167.1.el9_0.
- Update redhat python3-perf-debuginfo to version 0:5.14.0-70.167.1.el9_0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | bpftool | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | bpftool-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-abi-stablelists | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-core | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-core | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-devel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-devel-matched | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-modules | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-modules-extra | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-s390x | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-devel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-devel-matched | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-doc | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-modules | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-modules-extra | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-tools | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-tools-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-tools-libs | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-core | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-devel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-devel-matched | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-modules | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | perf | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | perf-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | python3-perf | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | python3-perf-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | bpftool | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | bpftool-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-abi-stablelists | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-core | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-core | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-devel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-devel-matched | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-modules | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debug-modules-extra | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-s390x | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-devel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-devel-matched | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-doc | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-modules | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-modules-extra | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-tools | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-tools-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-tools-libs | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-core | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-devel | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-devel-matched | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-modules | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | perf | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | perf-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | python3-perf | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
| redhat | python3-perf-debuginfo | <= 0:5.14.0-70.167.1.el9_0 | 0:5.14.0-70.167.1.el9_0 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3293 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2373326 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2383404 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394601 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2401432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419837 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2419919 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2420329 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2424880 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3293.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-53821 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2023-53821 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-53821 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53821-9542@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38022 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38022 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38022 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2025-38022-41b3@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38415 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38415 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38415 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39760 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39760 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39760 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39933 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39933 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39933 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40269 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40269 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40269 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40271 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40271 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40271 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-68349 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68349 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68349 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh... Third Party Advisory
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026