Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1512 - Security Advisory
Issued:
2026-01-28
Updated:
2026-01-28

RHSA-2026:1512 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)
  • kernel: media: rc: fix races with imon_disconnect() (CVE-2025-39993)
  • kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (CVE-2023-53705)
  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)
  • kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition (CVE-2023-53751)
  • kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64

Fixes

  • BZ - 2400598 - CVE-2025-39898 kernel: e1000e: fix heap overflow in e1000_set_eeprom
  • BZ - 2404121 - CVE-2025-39993 kernel: media: rc: fix races with imon_disconnect()
  • BZ - 2405713 - CVE-2023-53705 kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption
  • BZ - 2419858 - CVE-2023-53751 kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition
  • BZ - 2419954 - CVE-2025-40277 kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVEs

  • CVE-2023-53705
  • CVE-2023-53751
  • CVE-2025-39898
  • CVE-2025-39993
  • CVE-2025-40248
  • CVE-2025-40277

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.2

SRPM
kernel-4.18.0-193.183.1.el8_2.src.rpm SHA-256: b764fee227ec1c03a3f67a3a3a8af25549cf79e8a3ccd6bf80d7b668fd863e8e
x86_64
bpftool-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 9981e7a5a3a3195f51b37b8bceb8a11d3760b9966412b641ccf95abf3f55edc6
bpftool-debuginfo-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: df6700ab6b117be9b64025d990b639aa70a452be4903f9f43ef88969674fd9e1
kernel-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 8adc953f0b6c9dbe057e666d7d0755086796588e7ce29731687eaf36b35e9d10
kernel-abi-whitelists-4.18.0-193.183.1.el8_2.noarch.rpm SHA-256: a03d35b59e629abf7de73506b49bf460d6872f9c911304433d9f034ab155fc2c
kernel-core-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: bba9f970abb692be53c19bc227a818d5ba0527231886b8bb4171741c7fb95e47
kernel-cross-headers-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 7aa6782be0796d767a1579701fbcd02a5f0bde94b2c1dcaa72afad10157ff1e6
kernel-debug-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 076121b9e4a0432c2a08a2e174d17d0b66c1b665e28c151448126c7311b7ae62
kernel-debug-core-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: bff8af4d95438d2a24e41ed6e7f1cd555ab58e7b228630d19feb156fe1f48acf
kernel-debug-debuginfo-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 88228d1b4cac7bd5c3ec0074ae6273c8bf34f82c2137052e81d8167496e22db5
kernel-debug-devel-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 91da6b8e26145e6efc59e8599f3a3f76f32b8f8321c56d0b3deb2537d523bf5c
kernel-debug-modules-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 85c9048d4ad49de6f2b3aa2b244abc40868e626a482c677f435e3efa6fe3f251
kernel-debug-modules-extra-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: ebd1cb13323d4f1a70b9a7211a522d026971ee9426ad6c9cb951b666a5a5695e
kernel-debuginfo-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 1982de7621eb4c8c67f1b0e7b80f478937a517221819e97f0395b74c9a541fde
kernel-debuginfo-common-x86_64-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: e1ff05e5ae2983f1d64b7d234256f3643969b83403f10c9f5c753789e4b5863b
kernel-devel-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 378ac3c625235a257fe351180b372a947e3ec3440fa0ef64926a6d4e540bac66
kernel-doc-4.18.0-193.183.1.el8_2.noarch.rpm SHA-256: 0bad9142171ab6b04faeea7b789bef5f2cbbb2debc78bf5cc5530593c58c1b75
kernel-headers-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 2e1c7c50244afc1b071850aa98f81dc482f0f29fbc0ea7f55d22fc097ee23f83
kernel-modules-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: b38f19d0b0514e983d3342b903279ed5f50f1c3973c1cfa37b868f9890f9c067
kernel-modules-extra-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: df690f9666fbbc77bd96ae2635e8cd548069fdadfc76b7b67f96931879995b8a
kernel-tools-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: a45d6be15d8304fc67f707243029d9392ccdc1525489af54a60c04174b39f05d
kernel-tools-debuginfo-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 93bf17b33ec8c368740f81ee3aff9375de8571daa230bfbe45bdc5387ed2a2e5
kernel-tools-libs-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 6d8ed12163a7de157f41b48535b7e7dfb57a14f7a000dda3b8f3b556012fcb03
perf-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: b7928d5b1557a92441b8e2c3b7353167698315c03af28a45bdd8fdb6389fd3c5
perf-debuginfo-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 361eeab899c0962bbecff4faa4bc7859dd6ced6195678e63ef5980ad1c4dfa5d
python3-perf-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: a1a9f735225ef64f2e7f16bb97d957f7ed59d22d05b87b317e5b2323818af55f
python3-perf-debuginfo-4.18.0-193.183.1.el8_2.x86_64.rpm SHA-256: 10654af68eba402a5c1bca41371a8c21b1b45a8a4a96a4db0ed030a63b6e3224

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility