Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.0
Red Hat Linux Kernel Patches Vulnerable to Remote Execution
RHSA-2026:3865
Summary
Red Hat has released patches to fix security issues in the Linux kernel. These patches address vulnerabilities that could allow an attacker to execute code remotely, potentially leading to unauthorized access and data theft. Update your systems to the latest patched versions to mitigate this risk.
What to do
- Update redhat kpatch-patch-4_18_0-477_107_1 to version 0:1-3.el8_8.
- Update redhat kpatch-patch-4_18_0-477_107_1-debuginfo to version 0:1-3.el8_8.
- Update redhat kpatch-patch-4_18_0-477_107_1-debugsource to version 0:1-3.el8_8.
- Update redhat kpatch-patch-4_18_0-477_120_1 to version 0:1-2.el8_8.
- Update redhat kpatch-patch-4_18_0-477_120_1-debuginfo to version 0:1-2.el8_8.
- Update redhat kpatch-patch-4_18_0-477_120_1-debugsource to version 0:1-2.el8_8.
- Update redhat kpatch-patch-4_18_0-477_81_1 to version 0:1-11.el8_8.
- Update redhat kpatch-patch-4_18_0-477_81_1-debuginfo to version 0:1-11.el8_8.
- Update redhat kpatch-patch-4_18_0-477_81_1-debugsource to version 0:1-11.el8_8.
- Update redhat kpatch-patch-4_18_0-477_89_1 to version 0:1-9.el8_8.
- Update redhat kpatch-patch-4_18_0-477_89_1-debuginfo to version 0:1-9.el8_8.
- Update redhat kpatch-patch-4_18_0-477_89_1-debugsource to version 0:1-9.el8_8.
- Update redhat kpatch-patch-4_18_0-477_97_1 to version 0:1-7.el8_8.
- Update redhat kpatch-patch-4_18_0-477_97_1-debuginfo to version 0:1-7.el8_8.
- Update redhat kpatch-patch-4_18_0-477_97_1-debugsource to version 0:1-7.el8_8.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kpatch-patch-4_18_0-477_107_1 | <= 0:1-3.el8_8 | 0:1-3.el8_8 |
| redhat | kpatch-patch-4_18_0-477_107_1-debuginfo | <= 0:1-3.el8_8 | 0:1-3.el8_8 |
| redhat | kpatch-patch-4_18_0-477_107_1-debugsource | <= 0:1-3.el8_8 | 0:1-3.el8_8 |
| redhat | kpatch-patch-4_18_0-477_120_1 | <= 0:1-2.el8_8 | 0:1-2.el8_8 |
| redhat | kpatch-patch-4_18_0-477_120_1-debuginfo | <= 0:1-2.el8_8 | 0:1-2.el8_8 |
| redhat | kpatch-patch-4_18_0-477_120_1-debugsource | <= 0:1-2.el8_8 | 0:1-2.el8_8 |
| redhat | kpatch-patch-4_18_0-477_81_1 | <= 0:1-11.el8_8 | 0:1-11.el8_8 |
| redhat | kpatch-patch-4_18_0-477_81_1-debuginfo | <= 0:1-11.el8_8 | 0:1-11.el8_8 |
| redhat | kpatch-patch-4_18_0-477_81_1-debugsource | <= 0:1-11.el8_8 | 0:1-11.el8_8 |
| redhat | kpatch-patch-4_18_0-477_89_1 | <= 0:1-9.el8_8 | 0:1-9.el8_8 |
| redhat | kpatch-patch-4_18_0-477_89_1-debuginfo | <= 0:1-9.el8_8 | 0:1-9.el8_8 |
| redhat | kpatch-patch-4_18_0-477_89_1-debugsource | <= 0:1-9.el8_8 | 0:1-9.el8_8 |
| redhat | kpatch-patch-4_18_0-477_97_1 | <= 0:1-7.el8_8 | 0:1-7.el8_8 |
| redhat | kpatch-patch-4_18_0-477_97_1-debuginfo | <= 0:1-7.el8_8 | 0:1-7.el8_8 |
| redhat | kpatch-patch-4_18_0-477_97_1-debugsource | <= 0:1-7.el8_8 | 0:1-7.el8_8 |
Original title
Red Hat Security Advisory: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_81_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 security update
osv CVSS3.1
7.0
- https://access.redhat.com/errata/RHSA-2026:3865 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418872 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3865.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-40248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh... Third Party Advisory
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026