Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.0
Critical Linux Kernel Patches for Red Hat Systems
RHSA-2026:3867
Summary
Multiple critical security patches have been released for the Linux kernel on Red Hat systems to fix vulnerabilities that could allow attackers to execute arbitrary code or escalate privileges. These patches are essential to install to prevent potential security breaches. Apply these patches as soon as possible to ensure the security of your systems.
What to do
- Update redhat kpatch-patch-5_14_0-427_100_1 to version 0:1-2.el9_4.
- Update redhat kpatch-patch-5_14_0-427_100_1-debuginfo to version 0:1-2.el9_4.
- Update redhat kpatch-patch-5_14_0-427_100_1-debugsource to version 0:1-2.el9_4.
- Update redhat kpatch-patch-5_14_0-427_44_1 to version 0:1-14.el9_4.
- Update redhat kpatch-patch-5_14_0-427_44_1-debuginfo to version 0:1-14.el9_4.
- Update redhat kpatch-patch-5_14_0-427_44_1-debugsource to version 0:1-14.el9_4.
- Update redhat kpatch-patch-5_14_0-427_55_1 to version 0:1-12.el9_4.
- Update redhat kpatch-patch-5_14_0-427_55_1-debuginfo to version 0:1-12.el9_4.
- Update redhat kpatch-patch-5_14_0-427_55_1-debugsource to version 0:1-12.el9_4.
- Update redhat kpatch-patch-5_14_0-427_68_2 to version 0:1-9.el9_4.
- Update redhat kpatch-patch-5_14_0-427_68_2-debuginfo to version 0:1-9.el9_4.
- Update redhat kpatch-patch-5_14_0-427_68_2-debugsource to version 0:1-9.el9_4.
- Update redhat kpatch-patch-5_14_0-427_84_1 to version 0:1-4.el9_4.
- Update redhat kpatch-patch-5_14_0-427_84_1-debuginfo to version 0:1-4.el9_4.
- Update redhat kpatch-patch-5_14_0-427_84_1-debugsource to version 0:1-4.el9_4.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kpatch-patch-5_14_0-427_100_1 | <= 0:1-2.el9_4 | 0:1-2.el9_4 |
| redhat | kpatch-patch-5_14_0-427_100_1-debuginfo | <= 0:1-2.el9_4 | 0:1-2.el9_4 |
| redhat | kpatch-patch-5_14_0-427_100_1-debugsource | <= 0:1-2.el9_4 | 0:1-2.el9_4 |
| redhat | kpatch-patch-5_14_0-427_44_1 | <= 0:1-14.el9_4 | 0:1-14.el9_4 |
| redhat | kpatch-patch-5_14_0-427_44_1-debuginfo | <= 0:1-14.el9_4 | 0:1-14.el9_4 |
| redhat | kpatch-patch-5_14_0-427_44_1-debugsource | <= 0:1-14.el9_4 | 0:1-14.el9_4 |
| redhat | kpatch-patch-5_14_0-427_55_1 | <= 0:1-12.el9_4 | 0:1-12.el9_4 |
| redhat | kpatch-patch-5_14_0-427_55_1-debuginfo | <= 0:1-12.el9_4 | 0:1-12.el9_4 |
| redhat | kpatch-patch-5_14_0-427_55_1-debugsource | <= 0:1-12.el9_4 | 0:1-12.el9_4 |
| redhat | kpatch-patch-5_14_0-427_68_2 | <= 0:1-9.el9_4 | 0:1-9.el9_4 |
| redhat | kpatch-patch-5_14_0-427_68_2-debuginfo | <= 0:1-9.el9_4 | 0:1-9.el9_4 |
| redhat | kpatch-patch-5_14_0-427_68_2-debugsource | <= 0:1-9.el9_4 | 0:1-9.el9_4 |
| redhat | kpatch-patch-5_14_0-427_84_1 | <= 0:1-4.el9_4 | 0:1-4.el9_4 |
| redhat | kpatch-patch-5_14_0-427_84_1-debuginfo | <= 0:1-4.el9_4 | 0:1-4.el9_4 |
| redhat | kpatch-patch-5_14_0-427_84_1-debugsource | <= 0:1-4.el9_4 | 0:1-4.el9_4 |
Original title
Red Hat Security Advisory: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 security update
osv CVSS3.1
7.0
- https://access.redhat.com/errata/RHSA-2026:3867 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418872 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3867.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-40248 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40248 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40248 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh... Third Party Advisory
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026