Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:14136 - Security Advisory
Issued:
2025-08-20
Updated:
2025-08-20

RHSA-2025:14136 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
  • kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
  • kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670)
  • kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
  • kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)
  • kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64

Fixes

  • BZ - 2348599 - CVE-2024-57980 kernel: media: uvcvideo: Fix double free in error path
  • BZ - 2356592 - CVE-2025-21928 kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
  • BZ - 2360786 - CVE-2021-47670 kernel: can: peak_usb: fix use after free bugs
  • BZ - 2363378 - CVE-2022-49788 kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
  • BZ - 2373630 - CVE-2022-50020 kernel: ext4: avoid resizing to a partial cluster size
  • BZ - 2375305 - CVE-2025-38086 kernel: net: ch9200: fix uninitialised access during mii_nway_restart

CVEs

  • CVE-2021-47670
  • CVE-2022-49788
  • CVE-2022-50020
  • CVE-2024-57980
  • CVE-2025-21928
  • CVE-2025-38086

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.2

SRPM
kernel-4.18.0-193.164.1.el8_2.src.rpm SHA-256: 7603d2821da5f79054f6d072346b3eaa27d608a9766d0bed036243b703248479
x86_64
bpftool-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: dde3e97901414719c907f5cb53878b9bf74d02432ec9af6c3b2b76694fba89da
bpftool-debuginfo-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: c6876372fca037141ca3af417eb169b4edaa6b3330f6107ac498dd98b5800c94
kernel-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: da21359fea8737af960822544e048490758b99c1fbeb9bbc6d8f804dbfd0a5b7
kernel-abi-whitelists-4.18.0-193.164.1.el8_2.noarch.rpm SHA-256: 591a600afdaae2f7b6d4fd6e060194d16eab89556f68606a1fbe2db5d1a61e30
kernel-core-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: dbe9a0a1d56725fb68ca24cab287d715ff346456f0dd9830e9c41564317a535f
kernel-cross-headers-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 3a653d266bc8eb2278fa73ca582dceb8416f5d94d13203e70ba536e5840a0001
kernel-debug-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 74f2b512b060bd3357a5c5f7fe06635e09d6d160988480d7248cd121d7d43f5f
kernel-debug-core-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 62bfdce3297504b225bfe925c0e2e3d723db31d14de246d2bbb13e60d2d77f0a
kernel-debug-debuginfo-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 8489fd6df95651a9215506f0db606b6a92d062883928a8db47541f094c0a09cc
kernel-debug-devel-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: cf945fe4c206b12227b5e411cdbf818fd394f850a532c4c86df0209f3ba008ab
kernel-debug-modules-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 0f76e1ab646ba0008374896daafc17b8f61fdfcbadea3ad0f81583a3066938db
kernel-debug-modules-extra-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 31be8f8c2f8e069bcd5ded7d7e41d1d5743c3f7f510faf884abf9e7000aae1d5
kernel-debuginfo-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 33b1881efeddf3cc5874af85e8838d242c64bbd73a59aa31f93397d972b0e515
kernel-debuginfo-common-x86_64-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 89901e373728ebdde05c6f18ca3d1208f88ffdebac3f6e5b3186b5f66c883669
kernel-devel-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 8146981982563bc08186cb54dfe399a872caa312370f890f12b5b814a7ae3dc7
kernel-doc-4.18.0-193.164.1.el8_2.noarch.rpm SHA-256: 1e3c82bcd7b17319c9fc184393548d5caf93743e09b99e496d4469d93d62fb32
kernel-headers-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: f75afb328985a0753cc739fd27946f0a8c4f2b55e366ff3c28987df7d0ed3c83
kernel-modules-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 63264a7c04dcff9b261cf1a297c6ae142d2194e410f6c4d03450ef6d5ea80fd2
kernel-modules-extra-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 3395f295b786801fa129c1d8183269e98b5618df379f33261af6b8c9a8f30766
kernel-tools-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 41423db370d4bef3de93f5dbf543cadc6b1f23006acc4fe67fcef3cdcf7a03b6
kernel-tools-debuginfo-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 34181e11719b5e69dfcf482bacd52225d8807512f9118c4e6085390914961b4b
kernel-tools-libs-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 932c952010361b3f9e3d57a134c02e118fd0b65f2b1deea44b2b46f939c12f33
perf-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 0d2450eb7fd3de5fba30ed5f0d34d1e60d977178ff4dbd10c7ea221b70fb5849
perf-debuginfo-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: ecae8ae12efa3344b5bd3c0cde7951897c96f48185699ebcfdc9b222dbcf47d5
python3-perf-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: 65283bae7c2e1ba3ebcabe5a6c55ed3066b2d4e86e98b61c1ae4fed0e4ea0910
python3-perf-debuginfo-4.18.0-193.164.1.el8_2.x86_64.rpm SHA-256: bec606a4f43ee883837705ef44c23841f9601efa3270dd03dc56d90d27d350a3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility