Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.0
Red Hat Linux Kernel Patches Contain Security Fixes for Unauthorized Access
RHSA-2026:3848
Summary
Red Hat has released patches to fix security issues in the Linux kernel that could allow an attacker to gain unauthorized access to a system. These patches are available for Red Hat Linux systems and should be applied as soon as possible to prevent potential exploitation. Users are advised to update their systems to the latest version of the kernel patches.
What to do
- Update redhat kpatch-patch-4_18_0-553_30_1 to version 0:1-11.el8_10.
- Update redhat kpatch-patch-4_18_0-553_30_1-debuginfo to version 0:1-11.el8_10.
- Update redhat kpatch-patch-4_18_0-553_30_1-debugsource to version 0:1-11.el8_10.
- Update redhat kpatch-patch-4_18_0-553_40_1 to version 0:1-9.el8_10.
- Update redhat kpatch-patch-4_18_0-553_40_1-debuginfo to version 0:1-9.el8_10.
- Update redhat kpatch-patch-4_18_0-553_40_1-debugsource to version 0:1-9.el8_10.
- Update redhat kpatch-patch-4_18_0-553_53_1 to version 0:1-7.el8_10.
- Update redhat kpatch-patch-4_18_0-553_53_1-debuginfo to version 0:1-7.el8_10.
- Update redhat kpatch-patch-4_18_0-553_53_1-debugsource to version 0:1-7.el8_10.
- Update redhat kpatch-patch-4_18_0-553_72_1 to version 0:1-4.el8_10.
- Update redhat kpatch-patch-4_18_0-553_72_1-debuginfo to version 0:1-4.el8_10.
- Update redhat kpatch-patch-4_18_0-553_72_1-debugsource to version 0:1-4.el8_10.
- Update redhat kpatch-patch-4_18_0-553_85_1 to version 0:1-2.el8_10.
- Update redhat kpatch-patch-4_18_0-553_85_1-debuginfo to version 0:1-2.el8_10.
- Update redhat kpatch-patch-4_18_0-553_85_1-debugsource to version 0:1-2.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kpatch-patch-4_18_0-553_30_1 | <= 0:1-11.el8_10 | 0:1-11.el8_10 |
| redhat | kpatch-patch-4_18_0-553_30_1-debuginfo | <= 0:1-11.el8_10 | 0:1-11.el8_10 |
| redhat | kpatch-patch-4_18_0-553_30_1-debugsource | <= 0:1-11.el8_10 | 0:1-11.el8_10 |
| redhat | kpatch-patch-4_18_0-553_40_1 | <= 0:1-9.el8_10 | 0:1-9.el8_10 |
| redhat | kpatch-patch-4_18_0-553_40_1-debuginfo | <= 0:1-9.el8_10 | 0:1-9.el8_10 |
| redhat | kpatch-patch-4_18_0-553_40_1-debugsource | <= 0:1-9.el8_10 | 0:1-9.el8_10 |
| redhat | kpatch-patch-4_18_0-553_53_1 | <= 0:1-7.el8_10 | 0:1-7.el8_10 |
| redhat | kpatch-patch-4_18_0-553_53_1-debuginfo | <= 0:1-7.el8_10 | 0:1-7.el8_10 |
| redhat | kpatch-patch-4_18_0-553_53_1-debugsource | <= 0:1-7.el8_10 | 0:1-7.el8_10 |
| redhat | kpatch-patch-4_18_0-553_72_1 | <= 0:1-4.el8_10 | 0:1-4.el8_10 |
| redhat | kpatch-patch-4_18_0-553_72_1-debuginfo | <= 0:1-4.el8_10 | 0:1-4.el8_10 |
| redhat | kpatch-patch-4_18_0-553_72_1-debugsource | <= 0:1-4.el8_10 | 0:1-4.el8_10 |
| redhat | kpatch-patch-4_18_0-553_85_1 | <= 0:1-2.el8_10 | 0:1-2.el8_10 |
| redhat | kpatch-patch-4_18_0-553_85_1-debuginfo | <= 0:1-2.el8_10 | 0:1-2.el8_10 |
| redhat | kpatch-patch-4_18_0-553_85_1-debugsource | <= 0:1-2.el8_10 | 0:1-2.el8_10 |
Original title
Red Hat Security Advisory: kpatch-patch-4_18_0-553_30_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 security update
osv CVSS3.1
7.0
- https://access.redhat.com/errata/RHSA-2026:3848 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418872 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3848.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-40248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh... Third Party Advisory
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026