Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2026:3886 - Security Advisory
发布:
2026-03-05
已更新:
2026-03-05

RHSA-2026:3886 - Security Advisory

  • 概述
  • 更新的软件包

概述

Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_92_1 security update

类型/严重性

Security Advisory: Important

Red Hat Lightspeed patch analysis

识别并修复受此公告影响的系统。

查看受影响的系统

标题

An update for multiple packages is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-284.92.1.el9_2.

Security Fix(es):

  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

受影响的产品

  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

修复

  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption

CVE

  • CVE-2025-40248

参考

  • https://access.redhat.com/security/updates/classification/#important
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux Server - AUS 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-13.el9_2.src.rpm SHA-256: 925ba93e86315d57fdc133e1911edc92030bc3573f48ffe09f19b1d9ae7954e1
kpatch-patch-5_14_0-284_117_1-1-10.el9_2.src.rpm SHA-256: b694887c88f372f5f433fa8ce723f4267a28b626ad3b030e3af6c3df92d01901
kpatch-patch-5_14_0-284_134_1-1-4.el9_2.src.rpm SHA-256: 62d0cd88aaaf9d50a233ad588d66eaac19a5b89252ee3f3c89fbdf626eaf5d5d
kpatch-patch-5_14_0-284_148_1-1-2.el9_2.src.rpm SHA-256: 4ceccae20f004e43ade67b2cc01feb552920c7be0b9df798de6adfced1405c4f
kpatch-patch-5_14_0-284_92_1-1-15.el9_2.src.rpm SHA-256: 01c980e0eaa8eced3d92aff2fb4f73960570151e728da7fd4f3407e823f82c1c
x86_64
kpatch-patch-5_14_0-284_104_1-1-13.el9_2.x86_64.rpm SHA-256: 49b5263c3648bdaf882ecc6afa248019f73f3495451d077f1e0bd295a7c419b0
kpatch-patch-5_14_0-284_104_1-debuginfo-1-13.el9_2.x86_64.rpm SHA-256: 7e93171cb79f5ccd2434511225a2d05cd6251e2d59cd873eda956ca3f9cc0d92
kpatch-patch-5_14_0-284_104_1-debugsource-1-13.el9_2.x86_64.rpm SHA-256: 72846b66afb14a8dfca0ef692f4ecb5538323ffcdd8ce3c3aab3a91eb605ac44
kpatch-patch-5_14_0-284_117_1-1-10.el9_2.x86_64.rpm SHA-256: ca113af5dab5b54df3edcac2452825b510043b3290a525a3f6afb8ed1117f024
kpatch-patch-5_14_0-284_117_1-debuginfo-1-10.el9_2.x86_64.rpm SHA-256: 4e402429673f9607a637030d4daa36aa4602011dc854147467d6a26ab72f6ef8
kpatch-patch-5_14_0-284_117_1-debugsource-1-10.el9_2.x86_64.rpm SHA-256: 2d3237fc9fe8750abb2b2a8d0de09f3ce127b9d15f6de7a5c775214461c98a1d
kpatch-patch-5_14_0-284_134_1-1-4.el9_2.x86_64.rpm SHA-256: 9c6448e338e1af36aea8a7d1ffc39e76d3065be3807c1940d168be7ced8940f4
kpatch-patch-5_14_0-284_134_1-debuginfo-1-4.el9_2.x86_64.rpm SHA-256: 97222ace3c38692fc8deeaef24bc356adcd0a959fbb6ce8b8d3440ef35032c3f
kpatch-patch-5_14_0-284_134_1-debugsource-1-4.el9_2.x86_64.rpm SHA-256: f3ba9bc003df59e1b4c5f5e8077cdfe4fbc587689d8e3cea11a1f7db21d516ff
kpatch-patch-5_14_0-284_148_1-1-2.el9_2.x86_64.rpm SHA-256: 39650d09da1bf13488e424c0476ce91bdc98134e05f519dcb9ccb299206b6d87
kpatch-patch-5_14_0-284_148_1-debuginfo-1-2.el9_2.x86_64.rpm SHA-256: f2afd4f83c99e3fa3e70afae774f9c1a1ab104a12d48ace5b2e207df3191605d
kpatch-patch-5_14_0-284_148_1-debugsource-1-2.el9_2.x86_64.rpm SHA-256: 7036d3492f1b85b373c089ade868fc50169dad7ed5f0b9b9deaf2512d4e9b814
kpatch-patch-5_14_0-284_92_1-1-15.el9_2.x86_64.rpm SHA-256: c631cd1d182315795889481c9e810ca5cea10407be6a579eb05c697d840191d1
kpatch-patch-5_14_0-284_92_1-debuginfo-1-15.el9_2.x86_64.rpm SHA-256: 659a374cbe14a3627da5fe8b9863bf571b76df0021fd5f3fb9be75380f721d89
kpatch-patch-5_14_0-284_92_1-debugsource-1-15.el9_2.x86_64.rpm SHA-256: 8a4b1a519ca9b1bed566c4be621efa2879430985ced8d43d2a81863fbb015345

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-13.el9_2.src.rpm SHA-256: 925ba93e86315d57fdc133e1911edc92030bc3573f48ffe09f19b1d9ae7954e1
kpatch-patch-5_14_0-284_117_1-1-10.el9_2.src.rpm SHA-256: b694887c88f372f5f433fa8ce723f4267a28b626ad3b030e3af6c3df92d01901
kpatch-patch-5_14_0-284_134_1-1-4.el9_2.src.rpm SHA-256: 62d0cd88aaaf9d50a233ad588d66eaac19a5b89252ee3f3c89fbdf626eaf5d5d
kpatch-patch-5_14_0-284_148_1-1-2.el9_2.src.rpm SHA-256: 4ceccae20f004e43ade67b2cc01feb552920c7be0b9df798de6adfced1405c4f
kpatch-patch-5_14_0-284_92_1-1-15.el9_2.src.rpm SHA-256: 01c980e0eaa8eced3d92aff2fb4f73960570151e728da7fd4f3407e823f82c1c
ppc64le
kpatch-patch-5_14_0-284_104_1-1-13.el9_2.ppc64le.rpm SHA-256: ab325e380879642d69dd392a7beb49e12b75ba390a8cc5e3cd122a99f84a50ec
kpatch-patch-5_14_0-284_104_1-debuginfo-1-13.el9_2.ppc64le.rpm SHA-256: 11a8b9f5d87fb958343f6ea6adb066add24f91ed6c9811b09fa075b42fc8e997
kpatch-patch-5_14_0-284_104_1-debugsource-1-13.el9_2.ppc64le.rpm SHA-256: 8756c74803d008df76a933284fc97f86506a65b92f19c9405e1ae3fa3622bc9a
kpatch-patch-5_14_0-284_117_1-1-10.el9_2.ppc64le.rpm SHA-256: ab751ca7d9d36ac33c80e35abb8ad26087b23f1aea1500cd9a242f65e3399218
kpatch-patch-5_14_0-284_117_1-debuginfo-1-10.el9_2.ppc64le.rpm SHA-256: 5be49d16cd340ee6130119bd4ecdc410cf52fbbe9902552ba39d18da10e8a3bd
kpatch-patch-5_14_0-284_117_1-debugsource-1-10.el9_2.ppc64le.rpm SHA-256: 5ea3ad1ce8cf0be2232835bba37a0783ff17006cecbab8542856f4ae52585ffc
kpatch-patch-5_14_0-284_134_1-1-4.el9_2.ppc64le.rpm SHA-256: fe3b022f09d4ea94260387dd4dde5939e21bb08c32a4b4a365f64c993697bad5
kpatch-patch-5_14_0-284_134_1-debuginfo-1-4.el9_2.ppc64le.rpm SHA-256: 2a4b59bbe76dbf38f2c698aacff1d53ab7fc08138cc40c3072c9208280edc947
kpatch-patch-5_14_0-284_134_1-debugsource-1-4.el9_2.ppc64le.rpm SHA-256: 725396f6b3d213f4c82b5dbed33ad74b2fdd8db7f19c328fc06c2d1feb2a10d8
kpatch-patch-5_14_0-284_148_1-1-2.el9_2.ppc64le.rpm SHA-256: 5635c38039ec105637d4e2aab334fc364f9ccd4ffd4aa54e4caac318597a4e2e
kpatch-patch-5_14_0-284_148_1-debuginfo-1-2.el9_2.ppc64le.rpm SHA-256: d3638583514da20c91b284d4ec3d01d81d16f229f28855acdb8427e71d489ae1
kpatch-patch-5_14_0-284_148_1-debugsource-1-2.el9_2.ppc64le.rpm SHA-256: 1894fb5ead4ed680a785f643cb0c59196797cd5634646a0ad8b3f3a087aed89d
kpatch-patch-5_14_0-284_92_1-1-15.el9_2.ppc64le.rpm SHA-256: a8a92012ef5b77b2c31ee0ef1a6954eeba70d1721f9117df7ec660a1395bcb51
kpatch-patch-5_14_0-284_92_1-debuginfo-1-15.el9_2.ppc64le.rpm SHA-256: 4d710d3b019107c12b073db89bcefcbefdca58056524a59200e81c0a2aa5ee7f
kpatch-patch-5_14_0-284_92_1-debugsource-1-15.el9_2.ppc64le.rpm SHA-256: 1160ad323cc15238ad4af4a21fbbaa62f1865ec3fd1404723ce300b693e1d207

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-13.el9_2.src.rpm SHA-256: 925ba93e86315d57fdc133e1911edc92030bc3573f48ffe09f19b1d9ae7954e1
kpatch-patch-5_14_0-284_117_1-1-10.el9_2.src.rpm SHA-256: b694887c88f372f5f433fa8ce723f4267a28b626ad3b030e3af6c3df92d01901
kpatch-patch-5_14_0-284_134_1-1-4.el9_2.src.rpm SHA-256: 62d0cd88aaaf9d50a233ad588d66eaac19a5b89252ee3f3c89fbdf626eaf5d5d
kpatch-patch-5_14_0-284_148_1-1-2.el9_2.src.rpm SHA-256: 4ceccae20f004e43ade67b2cc01feb552920c7be0b9df798de6adfced1405c4f
kpatch-patch-5_14_0-284_92_1-1-15.el9_2.src.rpm SHA-256: 01c980e0eaa8eced3d92aff2fb4f73960570151e728da7fd4f3407e823f82c1c
x86_64
kpatch-patch-5_14_0-284_104_1-1-13.el9_2.x86_64.rpm SHA-256: 49b5263c3648bdaf882ecc6afa248019f73f3495451d077f1e0bd295a7c419b0
kpatch-patch-5_14_0-284_104_1-debuginfo-1-13.el9_2.x86_64.rpm SHA-256: 7e93171cb79f5ccd2434511225a2d05cd6251e2d59cd873eda956ca3f9cc0d92
kpatch-patch-5_14_0-284_104_1-debugsource-1-13.el9_2.x86_64.rpm SHA-256: 72846b66afb14a8dfca0ef692f4ecb5538323ffcdd8ce3c3aab3a91eb605ac44
kpatch-patch-5_14_0-284_117_1-1-10.el9_2.x86_64.rpm SHA-256: ca113af5dab5b54df3edcac2452825b510043b3290a525a3f6afb8ed1117f024
kpatch-patch-5_14_0-284_117_1-debuginfo-1-10.el9_2.x86_64.rpm SHA-256: 4e402429673f9607a637030d4daa36aa4602011dc854147467d6a26ab72f6ef8
kpatch-patch-5_14_0-284_117_1-debugsource-1-10.el9_2.x86_64.rpm SHA-256: 2d3237fc9fe8750abb2b2a8d0de09f3ce127b9d15f6de7a5c775214461c98a1d
kpatch-patch-5_14_0-284_134_1-1-4.el9_2.x86_64.rpm SHA-256: 9c6448e338e1af36aea8a7d1ffc39e76d3065be3807c1940d168be7ced8940f4
kpatch-patch-5_14_0-284_134_1-debuginfo-1-4.el9_2.x86_64.rpm SHA-256: 97222ace3c38692fc8deeaef24bc356adcd0a959fbb6ce8b8d3440ef35032c3f
kpatch-patch-5_14_0-284_134_1-debugsource-1-4.el9_2.x86_64.rpm SHA-256: f3ba9bc003df59e1b4c5f5e8077cdfe4fbc587689d8e3cea11a1f7db21d516ff
kpatch-patch-5_14_0-284_148_1-1-2.el9_2.x86_64.rpm SHA-256: 39650d09da1bf13488e424c0476ce91bdc98134e05f519dcb9ccb299206b6d87
kpatch-patch-5_14_0-284_148_1-debuginfo-1-2.el9_2.x86_64.rpm SHA-256: f2afd4f83c99e3fa3e70afae774f9c1a1ab104a12d48ace5b2e207df3191605d
kpatch-patch-5_14_0-284_148_1-debugsource-1-2.el9_2.x86_64.rpm SHA-256: 7036d3492f1b85b373c089ade868fc50169dad7ed5f0b9b9deaf2512d4e9b814
kpatch-patch-5_14_0-284_92_1-1-15.el9_2.x86_64.rpm SHA-256: c631cd1d182315795889481c9e810ca5cea10407be6a579eb05c697d840191d1
kpatch-patch-5_14_0-284_92_1-debuginfo-1-15.el9_2.x86_64.rpm SHA-256: 659a374cbe14a3627da5fe8b9863bf571b76df0021fd5f3fb9be75380f721d89
kpatch-patch-5_14_0-284_92_1-debugsource-1-15.el9_2.x86_64.rpm SHA-256: 8a4b1a519ca9b1bed566c4be621efa2879430985ced8d43d2a81863fbb015345

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility