Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.0
Red Hat Enterprise Linux kernel patches contain security fixes
RHSA-2026:3866
Summary
Red Hat has released patches for the kernel in Red Hat Enterprise Linux that fix several security issues. This means that users of Red Hat Enterprise Linux should update their systems to the latest patches to prevent potential security risks. To stay secure, update your kernel to the latest version.
What to do
- Update redhat kpatch-patch-4_18_0-372_131_1 to version 0:1-12.el8_6.
- Update redhat kpatch-patch-4_18_0-372_131_1-debuginfo to version 0:1-12.el8_6.
- Update redhat kpatch-patch-4_18_0-372_131_1-debugsource to version 0:1-12.el8_6.
- Update redhat kpatch-patch-4_18_0-372_137_1 to version 0:1-9.el8_6.
- Update redhat kpatch-patch-4_18_0-372_137_1-debuginfo to version 0:1-9.el8_6.
- Update redhat kpatch-patch-4_18_0-372_137_1-debugsource to version 0:1-9.el8_6.
- Update redhat kpatch-patch-4_18_0-372_145_1 to version 0:1-7.el8_6.
- Update redhat kpatch-patch-4_18_0-372_145_1-debuginfo to version 0:1-7.el8_6.
- Update redhat kpatch-patch-4_18_0-372_145_1-debugsource to version 0:1-7.el8_6.
- Update redhat kpatch-patch-4_18_0-372_158_1 to version 0:1-3.el8_6.
- Update redhat kpatch-patch-4_18_0-372_158_1-debuginfo to version 0:1-3.el8_6.
- Update redhat kpatch-patch-4_18_0-372_158_1-debugsource to version 0:1-3.el8_6.
- Update redhat kpatch-patch-4_18_0-372_170_1 to version 0:1-2.el8_6.
- Update redhat kpatch-patch-4_18_0-372_170_1-debuginfo to version 0:1-2.el8_6.
- Update redhat kpatch-patch-4_18_0-372_170_1-debugsource to version 0:1-2.el8_6.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kpatch-patch-4_18_0-372_131_1 | <= 0:1-12.el8_6 | 0:1-12.el8_6 |
| redhat | kpatch-patch-4_18_0-372_131_1-debuginfo | <= 0:1-12.el8_6 | 0:1-12.el8_6 |
| redhat | kpatch-patch-4_18_0-372_131_1-debugsource | <= 0:1-12.el8_6 | 0:1-12.el8_6 |
| redhat | kpatch-patch-4_18_0-372_137_1 | <= 0:1-9.el8_6 | 0:1-9.el8_6 |
| redhat | kpatch-patch-4_18_0-372_137_1-debuginfo | <= 0:1-9.el8_6 | 0:1-9.el8_6 |
| redhat | kpatch-patch-4_18_0-372_137_1-debugsource | <= 0:1-9.el8_6 | 0:1-9.el8_6 |
| redhat | kpatch-patch-4_18_0-372_145_1 | <= 0:1-7.el8_6 | 0:1-7.el8_6 |
| redhat | kpatch-patch-4_18_0-372_145_1-debuginfo | <= 0:1-7.el8_6 | 0:1-7.el8_6 |
| redhat | kpatch-patch-4_18_0-372_145_1-debugsource | <= 0:1-7.el8_6 | 0:1-7.el8_6 |
| redhat | kpatch-patch-4_18_0-372_158_1 | <= 0:1-3.el8_6 | 0:1-3.el8_6 |
| redhat | kpatch-patch-4_18_0-372_158_1-debuginfo | <= 0:1-3.el8_6 | 0:1-3.el8_6 |
| redhat | kpatch-patch-4_18_0-372_158_1-debugsource | <= 0:1-3.el8_6 | 0:1-3.el8_6 |
| redhat | kpatch-patch-4_18_0-372_170_1 | <= 0:1-2.el8_6 | 0:1-2.el8_6 |
| redhat | kpatch-patch-4_18_0-372_170_1-debuginfo | <= 0:1-2.el8_6 | 0:1-2.el8_6 |
| redhat | kpatch-patch-4_18_0-372_170_1-debugsource | <= 0:1-2.el8_6 | 0:1-2.el8_6 |
Original title
Red Hat Security Advisory: kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, and kpatch-patch-4_18_0-372_170_1 security update
osv CVSS3.1
7.0
- https://access.redhat.com/errata/RHSA-2026:3866 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418872 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3866.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-40248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh... Third Party Advisory
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026