Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.0
Red Hat Kernel Patches: Potential Data Exposure in Linux Kernel
RHSA-2026:3868
Summary
A security update is available to address a vulnerability in the Linux kernel that could allow an attacker to access sensitive data. This update affects Red Hat Enterprise Linux systems with kernel versions 5.14.0. If you use these systems, apply the latest kernel patches to ensure your data remains secure.
What to do
- Update redhat kpatch-patch-5_14_0-570_17_1 to version 0:1-12.el9_6.
- Update redhat kpatch-patch-5_14_0-570_17_1-debuginfo to version 0:1-12.el9_6.
- Update redhat kpatch-patch-5_14_0-570_17_1-debugsource to version 0:1-12.el9_6.
- Update redhat kpatch-patch-5_14_0-570_39_1 to version 0:1-3.el9_6.
- Update redhat kpatch-patch-5_14_0-570_39_1-debuginfo to version 0:1-3.el9_6.
- Update redhat kpatch-patch-5_14_0-570_39_1-debugsource to version 0:1-3.el9_6.
- Update redhat kpatch-patch-5_14_0-570_66_1 to version 0:1-2.el9_6.
- Update redhat kpatch-patch-5_14_0-570_66_1-debuginfo to version 0:1-2.el9_6.
- Update redhat kpatch-patch-5_14_0-570_66_1-debugsource to version 0:1-2.el9_6.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kpatch-patch-5_14_0-570_17_1 | <= 0:1-12.el9_6 | 0:1-12.el9_6 |
| redhat | kpatch-patch-5_14_0-570_17_1-debuginfo | <= 0:1-12.el9_6 | 0:1-12.el9_6 |
| redhat | kpatch-patch-5_14_0-570_17_1-debugsource | <= 0:1-12.el9_6 | 0:1-12.el9_6 |
| redhat | kpatch-patch-5_14_0-570_39_1 | <= 0:1-3.el9_6 | 0:1-3.el9_6 |
| redhat | kpatch-patch-5_14_0-570_39_1-debuginfo | <= 0:1-3.el9_6 | 0:1-3.el9_6 |
| redhat | kpatch-patch-5_14_0-570_39_1-debugsource | <= 0:1-3.el9_6 | 0:1-3.el9_6 |
| redhat | kpatch-patch-5_14_0-570_66_1 | <= 0:1-2.el9_6 | 0:1-2.el9_6 |
| redhat | kpatch-patch-5_14_0-570_66_1-debuginfo | <= 0:1-2.el9_6 | 0:1-2.el9_6 |
| redhat | kpatch-patch-5_14_0-570_66_1-debugsource | <= 0:1-2.el9_6 | 0:1-2.el9_6 |
Original title
Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1, kpatch-patch-5_14_0-570_39_1, and kpatch-patch-5_14_0-570_66_1 security update
osv CVSS3.1
7.0
- https://access.redhat.com/errata/RHSA-2026:3868 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418872 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3868.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-40248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh... Third Party Advisory
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026