Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:3866 - Security Advisory
Issued:
2026-03-05
Updated:
2026-03-05

RHSA-2026:3866 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, and kpatch-patch-4_18_0-372_170_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-372.131.1.el8_6.

Security Fix(es):

  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption

CVEs

  • CVE-2025-40248

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-372_131_1-1-12.el8_6.src.rpm SHA-256: 78373a8822ee41af06633eece49b16d7706a437c6582c8509e6859619bbe7e90
kpatch-patch-4_18_0-372_137_1-1-9.el8_6.src.rpm SHA-256: 1801eac0e97c43c9e49788a938aeaacb0e8f9c85514f5d89d2499354f63b21b2
kpatch-patch-4_18_0-372_145_1-1-7.el8_6.src.rpm SHA-256: bdb3637188c8beca3217f1cc2969cc55972e77bdfc4e5a9c1f40fe796e67bffd
kpatch-patch-4_18_0-372_158_1-1-3.el8_6.src.rpm SHA-256: 9d5e82a7bc335ebc9f917c83a0c032dbf5b6c54af35fa7dad90eb45d6d83401b
kpatch-patch-4_18_0-372_170_1-1-2.el8_6.src.rpm SHA-256: 94eb6e0f6351e4c6a0a8e0c074a080a415b35640a4e4cbe2446a4190bb1ef061
x86_64
kpatch-patch-4_18_0-372_131_1-1-12.el8_6.x86_64.rpm SHA-256: 6d01a02dd5b20267db6faa80bf62cc5afcaaf324f90f8f067468a98b482186ea
kpatch-patch-4_18_0-372_131_1-debuginfo-1-12.el8_6.x86_64.rpm SHA-256: fd95f4c8416840dd3f8366e9bacaa5c6eb3e9f3f2de7cfde3468812f0370364a
kpatch-patch-4_18_0-372_131_1-debugsource-1-12.el8_6.x86_64.rpm SHA-256: c74dd905f399147caa35bc088be093c0ea75779ecd08f02950c6b70699880901
kpatch-patch-4_18_0-372_137_1-1-9.el8_6.x86_64.rpm SHA-256: b2188891536c9610acd079d0f62093ebff02aab18446f73ab58596436b668ba5
kpatch-patch-4_18_0-372_137_1-debuginfo-1-9.el8_6.x86_64.rpm SHA-256: e85b8e34637a7beef4abeb3193da06348d27f0cf6a8a413381d8057123f30954
kpatch-patch-4_18_0-372_137_1-debugsource-1-9.el8_6.x86_64.rpm SHA-256: 6beb6da4d1f9d8b546e6e749b22bd649a1c228b54a4382176747a0ea13bd3221
kpatch-patch-4_18_0-372_145_1-1-7.el8_6.x86_64.rpm SHA-256: 253479cf0b73c8ebfc93d1ad3585bc9a0b28321eb4d0f1ee3176988570a2f491
kpatch-patch-4_18_0-372_145_1-debuginfo-1-7.el8_6.x86_64.rpm SHA-256: 783a0f5c28164e45d351927c0829ed0e2e37d925f656590c25eed3871878b828
kpatch-patch-4_18_0-372_145_1-debugsource-1-7.el8_6.x86_64.rpm SHA-256: 47e160b156a7db17f433ba0818d190a5637a93eab6cae6335eee4ff58872ca0f
kpatch-patch-4_18_0-372_158_1-1-3.el8_6.x86_64.rpm SHA-256: 09cd98231f9e68f6a59bd107669c445091beda8ac70553c74a93d63d87814be4
kpatch-patch-4_18_0-372_158_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: 7021e589ccacf1878eea686be8405326fd058b63aa1c7a25949d7da7c5ba6136
kpatch-patch-4_18_0-372_158_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: be0f306bd72eaacd3753d59a3f044e9b84b8f918248f1dfd76e7ccbd50bafc27
kpatch-patch-4_18_0-372_170_1-1-2.el8_6.x86_64.rpm SHA-256: 69980a624ce645d791c096b478bc3ce65d00421005e9e99b2ab989ff9f001a19
kpatch-patch-4_18_0-372_170_1-debuginfo-1-2.el8_6.x86_64.rpm SHA-256: 3825e91f3e231cc995b2ba2d151eb1663e4bcb183cc62bb51cfe2c15b7672ae4
kpatch-patch-4_18_0-372_170_1-debugsource-1-2.el8_6.x86_64.rpm SHA-256: 59f0c85834eb25e1021426cf8ccc1c591c49d506302e4fa2185cd822953f565e

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_131_1-1-12.el8_6.src.rpm SHA-256: 78373a8822ee41af06633eece49b16d7706a437c6582c8509e6859619bbe7e90
kpatch-patch-4_18_0-372_137_1-1-9.el8_6.src.rpm SHA-256: 1801eac0e97c43c9e49788a938aeaacb0e8f9c85514f5d89d2499354f63b21b2
kpatch-patch-4_18_0-372_145_1-1-7.el8_6.src.rpm SHA-256: bdb3637188c8beca3217f1cc2969cc55972e77bdfc4e5a9c1f40fe796e67bffd
kpatch-patch-4_18_0-372_158_1-1-3.el8_6.src.rpm SHA-256: 9d5e82a7bc335ebc9f917c83a0c032dbf5b6c54af35fa7dad90eb45d6d83401b
kpatch-patch-4_18_0-372_170_1-1-2.el8_6.src.rpm SHA-256: 94eb6e0f6351e4c6a0a8e0c074a080a415b35640a4e4cbe2446a4190bb1ef061
ppc64le
kpatch-patch-4_18_0-372_131_1-1-12.el8_6.ppc64le.rpm SHA-256: 0b3c667f2944af050b807fbf98ad24705a23637534668da001ab56e32f50e676
kpatch-patch-4_18_0-372_131_1-debuginfo-1-12.el8_6.ppc64le.rpm SHA-256: e72f3c78cfdeb3fc3e93c545aec8e705e57ce95098d327cbb6c1ad9382009bae
kpatch-patch-4_18_0-372_131_1-debugsource-1-12.el8_6.ppc64le.rpm SHA-256: aef41f8a5555f759bd95ab58a92060385f85a6949d7117d2ad2eecf4c5d4df5c
kpatch-patch-4_18_0-372_137_1-1-9.el8_6.ppc64le.rpm SHA-256: d7963d68020960439330e4b1524365710a0b167410d12aca6814a2c856b6bd32
kpatch-patch-4_18_0-372_137_1-debuginfo-1-9.el8_6.ppc64le.rpm SHA-256: e998be2f6f9191eb98e38636f2c093f4deff4f2c830d0d6d37294fc9efdef7ee
kpatch-patch-4_18_0-372_137_1-debugsource-1-9.el8_6.ppc64le.rpm SHA-256: 3824802f3d900ccd9b226cc8ddcffc61e19076c28ba7d123702a77d9ae11c675
kpatch-patch-4_18_0-372_145_1-1-7.el8_6.ppc64le.rpm SHA-256: 3c2bd9febba085b85a8c1a0c4f3d26db2bf94deffe7f8d052c0df65c1dc0a7b8
kpatch-patch-4_18_0-372_145_1-debuginfo-1-7.el8_6.ppc64le.rpm SHA-256: d83599b856f9605b592b1ac63817280e9735c1065bbebd2953a82f5ac6bec895
kpatch-patch-4_18_0-372_145_1-debugsource-1-7.el8_6.ppc64le.rpm SHA-256: 97fe8e9048b20541276a75b9acfb278895fe4c311d4eae502ce3686b41606b5b
kpatch-patch-4_18_0-372_158_1-1-3.el8_6.ppc64le.rpm SHA-256: fb4baa8a3017cf59ee17ce2d5088aa817951dc12f59b5840e4067c914120486e
kpatch-patch-4_18_0-372_158_1-debuginfo-1-3.el8_6.ppc64le.rpm SHA-256: 4a50067bac381185b450b2bbad1287e3de16698eb229210725183f3ae8264734
kpatch-patch-4_18_0-372_158_1-debugsource-1-3.el8_6.ppc64le.rpm SHA-256: fd76b25b1a450023bb494ce5721265a256249f4598b8712c1c7a8068a9650a9e
kpatch-patch-4_18_0-372_170_1-1-2.el8_6.ppc64le.rpm SHA-256: f6c98ef19be578bef18feee5c3b2f08ebb09026abd2d59c97cd375ac3aab4a13
kpatch-patch-4_18_0-372_170_1-debuginfo-1-2.el8_6.ppc64le.rpm SHA-256: 68f7a58bdb05a8fd289a693c943670d617099bdb9a1f06dd18ff9194fe65f961
kpatch-patch-4_18_0-372_170_1-debugsource-1-2.el8_6.ppc64le.rpm SHA-256: 5e38fdba00f89208e0fb163fe9e3e183bf0c1c150ad6285d296ce356bd5f9ed6

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_131_1-1-12.el8_6.src.rpm SHA-256: 78373a8822ee41af06633eece49b16d7706a437c6582c8509e6859619bbe7e90
kpatch-patch-4_18_0-372_137_1-1-9.el8_6.src.rpm SHA-256: 1801eac0e97c43c9e49788a938aeaacb0e8f9c85514f5d89d2499354f63b21b2
kpatch-patch-4_18_0-372_145_1-1-7.el8_6.src.rpm SHA-256: bdb3637188c8beca3217f1cc2969cc55972e77bdfc4e5a9c1f40fe796e67bffd
kpatch-patch-4_18_0-372_158_1-1-3.el8_6.src.rpm SHA-256: 9d5e82a7bc335ebc9f917c83a0c032dbf5b6c54af35fa7dad90eb45d6d83401b
kpatch-patch-4_18_0-372_170_1-1-2.el8_6.src.rpm SHA-256: 94eb6e0f6351e4c6a0a8e0c074a080a415b35640a4e4cbe2446a4190bb1ef061
x86_64
kpatch-patch-4_18_0-372_131_1-1-12.el8_6.x86_64.rpm SHA-256: 6d01a02dd5b20267db6faa80bf62cc5afcaaf324f90f8f067468a98b482186ea
kpatch-patch-4_18_0-372_131_1-debuginfo-1-12.el8_6.x86_64.rpm SHA-256: fd95f4c8416840dd3f8366e9bacaa5c6eb3e9f3f2de7cfde3468812f0370364a
kpatch-patch-4_18_0-372_131_1-debugsource-1-12.el8_6.x86_64.rpm SHA-256: c74dd905f399147caa35bc088be093c0ea75779ecd08f02950c6b70699880901
kpatch-patch-4_18_0-372_137_1-1-9.el8_6.x86_64.rpm SHA-256: b2188891536c9610acd079d0f62093ebff02aab18446f73ab58596436b668ba5
kpatch-patch-4_18_0-372_137_1-debuginfo-1-9.el8_6.x86_64.rpm SHA-256: e85b8e34637a7beef4abeb3193da06348d27f0cf6a8a413381d8057123f30954
kpatch-patch-4_18_0-372_137_1-debugsource-1-9.el8_6.x86_64.rpm SHA-256: 6beb6da4d1f9d8b546e6e749b22bd649a1c228b54a4382176747a0ea13bd3221
kpatch-patch-4_18_0-372_145_1-1-7.el8_6.x86_64.rpm SHA-256: 253479cf0b73c8ebfc93d1ad3585bc9a0b28321eb4d0f1ee3176988570a2f491
kpatch-patch-4_18_0-372_145_1-debuginfo-1-7.el8_6.x86_64.rpm SHA-256: 783a0f5c28164e45d351927c0829ed0e2e37d925f656590c25eed3871878b828
kpatch-patch-4_18_0-372_145_1-debugsource-1-7.el8_6.x86_64.rpm SHA-256: 47e160b156a7db17f433ba0818d190a5637a93eab6cae6335eee4ff58872ca0f
kpatch-patch-4_18_0-372_158_1-1-3.el8_6.x86_64.rpm SHA-256: 09cd98231f9e68f6a59bd107669c445091beda8ac70553c74a93d63d87814be4
kpatch-patch-4_18_0-372_158_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: 7021e589ccacf1878eea686be8405326fd058b63aa1c7a25949d7da7c5ba6136
kpatch-patch-4_18_0-372_158_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: be0f306bd72eaacd3753d59a3f044e9b84b8f918248f1dfd76e7ccbd50bafc27
kpatch-patch-4_18_0-372_170_1-1-2.el8_6.x86_64.rpm SHA-256: 69980a624ce645d791c096b478bc3ce65d00421005e9e99b2ab989ff9f001a19
kpatch-patch-4_18_0-372_170_1-debuginfo-1-2.el8_6.x86_64.rpm SHA-256: 3825e91f3e231cc995b2ba2d151eb1663e4bcb183cc62bb51cfe2c15b7672ae4
kpatch-patch-4_18_0-372_170_1-debugsource-1-2.el8_6.x86_64.rpm SHA-256: 59f0c85834eb25e1021426cf8ccc1c591c49d506302e4fa2185cd822953f565e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility