Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:3848 - Security Advisory
Issued:
2026-03-05
Updated:
2026-03-05

RHSA-2026:3848 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-4_18_0-553_30_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-553.30.1.el8_10.

Security Fix(es):

  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le

Fixes

  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption

CVEs

  • CVE-2025-40248

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-553_30_1-1-11.el8_10.src.rpm SHA-256: 4507dce5c3bddec4705dd88816b9f5f69d0116939e4ce262f9a94abe933e6d0d
kpatch-patch-4_18_0-553_40_1-1-9.el8_10.src.rpm SHA-256: 4401cd6302db25fdefdeb04180fea3047ba71b01d01cb4045641da04dd137e97
kpatch-patch-4_18_0-553_53_1-1-7.el8_10.src.rpm SHA-256: 2d0148b6099ac3aa4e2c3a1e30988b89d7a72842d917043229f9f4a50857f2c9
kpatch-patch-4_18_0-553_72_1-1-4.el8_10.src.rpm SHA-256: dfdeaf02856f7979d0e211aa3d7251d709b9d71a606abb6dc46d94dffe9ec0c9
kpatch-patch-4_18_0-553_85_1-1-2.el8_10.src.rpm SHA-256: d26cdadded548b4c8b11da8f47ccadb95b2b601411319a18bb21bcd4adfc17cc
x86_64
kpatch-patch-4_18_0-553_30_1-1-11.el8_10.x86_64.rpm SHA-256: 496d5abfead001f008e3c82eef33042124000da49092e3872f244788860ed9f8
kpatch-patch-4_18_0-553_30_1-debuginfo-1-11.el8_10.x86_64.rpm SHA-256: 6bb19855325abf0efa14fae09c4bb6b2ceaad0b97b3f9f7be2bba2a75760bcac
kpatch-patch-4_18_0-553_30_1-debugsource-1-11.el8_10.x86_64.rpm SHA-256: 70cba63c6c5b7be7330529395b509c961ab94b6d7fa89e17c2115702e371eb86
kpatch-patch-4_18_0-553_40_1-1-9.el8_10.x86_64.rpm SHA-256: d9229a720b14c4d6dea7db357dc4c3c7ab4d1f1e8d36ea09e3117d9f0a1d6178
kpatch-patch-4_18_0-553_40_1-debuginfo-1-9.el8_10.x86_64.rpm SHA-256: f8b4b8feee996b194dcd1186e70d89875d97db55eea67af3280268616900fdbf
kpatch-patch-4_18_0-553_40_1-debugsource-1-9.el8_10.x86_64.rpm SHA-256: 0266f0a81b108237fac60ecebd2c9d3f369fd3feefd4a0615a4454ef684cac7d
kpatch-patch-4_18_0-553_53_1-1-7.el8_10.x86_64.rpm SHA-256: 3bd2623046347cc144b5293e1785da89231923d5902f9b58d2c51c5e56f421d7
kpatch-patch-4_18_0-553_53_1-debuginfo-1-7.el8_10.x86_64.rpm SHA-256: 145bdf0b7f730add609e1454bf1421798af6418232491abdf0c24f7029770b21
kpatch-patch-4_18_0-553_53_1-debugsource-1-7.el8_10.x86_64.rpm SHA-256: b43c7572814c7cd3a41db94a498cbb5fdf1890b897b561519d787c5dcd0879e9
kpatch-patch-4_18_0-553_72_1-1-4.el8_10.x86_64.rpm SHA-256: f06b493b91b51f20d2467be85a4a7907bfa341f3cac2b40dc159a85f9b8c4b6f
kpatch-patch-4_18_0-553_72_1-debuginfo-1-4.el8_10.x86_64.rpm SHA-256: 7cba59e3f5333f46deafc0954c8516b7a4e3f1b96178244c7cd495123eb4faf5
kpatch-patch-4_18_0-553_72_1-debugsource-1-4.el8_10.x86_64.rpm SHA-256: 67d20604fe949471ebb3a0838bdf124cd0fc1235b1a8d5e7205e3c5a1c2e5994
kpatch-patch-4_18_0-553_85_1-1-2.el8_10.x86_64.rpm SHA-256: 507580c9f162aa85c89cf69d3003c1194b1e7001b460e982cf9842ccf778e9f7
kpatch-patch-4_18_0-553_85_1-debuginfo-1-2.el8_10.x86_64.rpm SHA-256: 0bdb82eb04a669c4e407a41e9b31305e5d1bc83eef2635892965f68a3f11ad06
kpatch-patch-4_18_0-553_85_1-debugsource-1-2.el8_10.x86_64.rpm SHA-256: ddf75ef4c314a66b46cd61018187776d2905c52c37ff4381ff8eb33c955eab83

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-553_30_1-1-11.el8_10.src.rpm SHA-256: 4507dce5c3bddec4705dd88816b9f5f69d0116939e4ce262f9a94abe933e6d0d
kpatch-patch-4_18_0-553_40_1-1-9.el8_10.src.rpm SHA-256: 4401cd6302db25fdefdeb04180fea3047ba71b01d01cb4045641da04dd137e97
kpatch-patch-4_18_0-553_53_1-1-7.el8_10.src.rpm SHA-256: 2d0148b6099ac3aa4e2c3a1e30988b89d7a72842d917043229f9f4a50857f2c9
kpatch-patch-4_18_0-553_72_1-1-4.el8_10.src.rpm SHA-256: dfdeaf02856f7979d0e211aa3d7251d709b9d71a606abb6dc46d94dffe9ec0c9
kpatch-patch-4_18_0-553_85_1-1-2.el8_10.src.rpm SHA-256: d26cdadded548b4c8b11da8f47ccadb95b2b601411319a18bb21bcd4adfc17cc
ppc64le
kpatch-patch-4_18_0-553_30_1-1-11.el8_10.ppc64le.rpm SHA-256: 559327b2b8b348296be1fdd10d1ed241ad5dab634f282bccc03779287fe37808
kpatch-patch-4_18_0-553_30_1-debuginfo-1-11.el8_10.ppc64le.rpm SHA-256: f033f6035d6e81052240502e1395e49974c94baee013ada3354ad5b659b77558
kpatch-patch-4_18_0-553_30_1-debugsource-1-11.el8_10.ppc64le.rpm SHA-256: 34318b5c452f236b4d688d1d22ba02450d1e6aebd43c8ec3a0c7b4e5121df0d2
kpatch-patch-4_18_0-553_40_1-1-9.el8_10.ppc64le.rpm SHA-256: c8ca73f1b43f7626f352346ae71d9430328e38294534a2727c513e67431711b1
kpatch-patch-4_18_0-553_40_1-debuginfo-1-9.el8_10.ppc64le.rpm SHA-256: 2b1052500c650ddbf3e6571e9279a1b274e61174e6c9502a48ce2bbde1e1c809
kpatch-patch-4_18_0-553_40_1-debugsource-1-9.el8_10.ppc64le.rpm SHA-256: e91645b272b091b419382c61a0869c00971cf98fbc9f23b462e15ff41f1aa672
kpatch-patch-4_18_0-553_53_1-1-7.el8_10.ppc64le.rpm SHA-256: 3f8dcbcb49526fcc595435984efa72125142cfcad4794c18d9ec819b1227fbe0
kpatch-patch-4_18_0-553_53_1-debuginfo-1-7.el8_10.ppc64le.rpm SHA-256: 54273caceeba3eedd311657a1d1b5bc46ae88e46ccc00141438e5fb1ec6163a5
kpatch-patch-4_18_0-553_53_1-debugsource-1-7.el8_10.ppc64le.rpm SHA-256: 018a74934e73246a7c581dd99c4064694d83daf6e30892e9be87460c56e1f6a0
kpatch-patch-4_18_0-553_72_1-1-4.el8_10.ppc64le.rpm SHA-256: 526028862719dd3d496c856e9567e2e3a03ba946815eb9d3d4a9a2d084132ef3
kpatch-patch-4_18_0-553_72_1-debuginfo-1-4.el8_10.ppc64le.rpm SHA-256: ce07405dea141a6ce9276386ad3287f41238b0384b82d2ad0dc0dfcf36e328e0
kpatch-patch-4_18_0-553_72_1-debugsource-1-4.el8_10.ppc64le.rpm SHA-256: 9b8502f69fc8478a4ea3a091a115ffb95d018d660dec1d0bbc492cb4e0b64682
kpatch-patch-4_18_0-553_85_1-1-2.el8_10.ppc64le.rpm SHA-256: bccb3158f4a10627df2de9e45914317eba4b956e2a889209f39eb3da1e69cdb3
kpatch-patch-4_18_0-553_85_1-debuginfo-1-2.el8_10.ppc64le.rpm SHA-256: 5609798a61bc256be1766922aebb3b298750c1e63ed4c374c68766ec1635b461
kpatch-patch-4_18_0-553_85_1-debugsource-1-2.el8_10.ppc64le.rpm SHA-256: d36cbf61890f2a94d4bb7e95057e20f7b4dbd839ed4fb55fe5e43c36d8939a7a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility