Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1886 - Security Advisory
Issued:
2026-02-04
Updated:
2026-02-04

RHSA-2026:1886 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: mac80211: fix potential double free on mesh join (CVE-2022-49290)
  • kernel: cifs: fix oops during encryption (CVE-2022-50341)
  • kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)
  • kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154)
  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)
  • kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition (CVE-2023-53751)
  • kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)
  • kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64

Fixes

  • BZ - 2347727 - CVE-2022-49290 kernel: mac80211: fix potential double free on mesh join
  • BZ - 2395879 - CVE-2022-50341 kernel: cifs: fix oops during encryption
  • BZ - 2404108 - CVE-2025-39971 kernel: i40e: fix idx validation in config queues msg
  • BZ - 2414494 - CVE-2025-40154 kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption
  • BZ - 2419858 - CVE-2023-53751 kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition
  • BZ - 2419954 - CVE-2025-40277 kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
  • BZ - 2422836 - CVE-2025-68301 kernel: net: atlantic: fix fragment overflow handling in RX path

CVEs

  • CVE-2022-49290
  • CVE-2022-50341
  • CVE-2023-53751
  • CVE-2025-39971
  • CVE-2025-40154
  • CVE-2025-40248
  • CVE-2025-40277
  • CVE-2025-68301

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kernel-4.18.0-305.184.1.el8_4.src.rpm SHA-256: 1351d9c0a036997613b039609ec457ee0593c076ca3d3841c2c1197eb330ee44
x86_64
bpftool-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 53784522c227bf75f264464a9bb508936830df5d0cc3b235b55ddfc3a337444a
bpftool-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 8ce61d4574387511a631eb4f8c4897a9d97a9f8f1e2a05be19588ede3f838439
kernel-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 976f9e2adaa12a24ceafab81226ef4817ecae8cb1c8192bac78571788b68061f
kernel-abi-stablelists-4.18.0-305.184.1.el8_4.noarch.rpm SHA-256: 4561122f715a1ea90da15ba5d1c1604550ce398be664d97dc8d42854e9879579
kernel-core-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 016b160bf5684c3315d4e90690d0c61f5db859b536dd6b76cdaa04f13261cc81
kernel-cross-headers-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 3a5fef97c21c932fba6bd3455ed523717c9e87825db2c3323cc78bd81b580ff3
kernel-debug-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 8e3bc33fb1af4ac2de3eef902da9cd1d76185fbaca674929ef5b2cb559fea132
kernel-debug-core-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: c3f6842c08636350d720da20f46523451269751a95d75f262c7b1bce56142096
kernel-debug-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 70ad5c62d2bc2f392cc61fbbb5197527bb45d79a7da9e93682a57e8073bc3f2a
kernel-debug-devel-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 310d56c01abe1f62df23e44e83c67b83307b9aa6b30c47c87c3811b9b1fc0149
kernel-debug-modules-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: ca75446d89c1e92b44d261e457978baa724a14f64297146daf07cc13ab1d84c0
kernel-debug-modules-extra-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 7231cbfaa127ad9aaf5802e5335b51839befcb0edaefbd2319e9072a7322933b
kernel-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: d5830aa1e40bfd9ad1b5e3f885754344e3869da4a134e8aafa10d0e6e180d031
kernel-debuginfo-common-x86_64-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 78291fab5789750743e975c2461707c044fa30b3f77c204e3d5becb8c4964ad4
kernel-devel-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 23e1c7d7a16222a7ad19b39ea2f39176d0bbbb43a0080f6ed0b4ced82b0aa9c1
kernel-doc-4.18.0-305.184.1.el8_4.noarch.rpm SHA-256: 3eb1ce97477074be6358f4c565959bbef51e53c977caf664424f6cd5daf623b6
kernel-headers-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: e6775bc5d181d64bfb227f44977f594b970fc58d0c71d64bf9667a78deb22e4b
kernel-modules-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 14835610286c0385f514630b9c0042bddb681f636947a0e671fbe4262f439276
kernel-modules-extra-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: e7065708b134034ee4b15b37aae87019bf0dcf19b67b25841d32771646ab5891
kernel-tools-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 8f1bc1d17166fd3a1036dd9d6f3e6dfb135e897676224d6d0b9eb141d2e44830
kernel-tools-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 4f9a85b56e122bb58ed55f4aa1cdfdd962020c21a525e1b51b8375d6742a73b0
kernel-tools-libs-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 0c0282f315655ca5297b7966d0e3ae54cb6d10faf69e3be2ac1f0c303e27cfcc
perf-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 6db124cfd9ae11ef02504995370c8c7f1ebb3616bf389ab298be95ce76d409e9
perf-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: ae8dbe721b323a7af36955a00f66d26298e5afcff120cd4af1626f09874150f6
python3-perf-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: b3f5e84f5c28702aa152cda8eb1446242dae59242b21fd130dfbd916ef20d27b
python3-perf-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 2179a4760f80e201206adcf8d91c482848020313124f1ebac70aa9cd4a6524a1

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kernel-4.18.0-305.184.1.el8_4.src.rpm SHA-256: 1351d9c0a036997613b039609ec457ee0593c076ca3d3841c2c1197eb330ee44
x86_64
bpftool-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 53784522c227bf75f264464a9bb508936830df5d0cc3b235b55ddfc3a337444a
bpftool-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 8ce61d4574387511a631eb4f8c4897a9d97a9f8f1e2a05be19588ede3f838439
kernel-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 976f9e2adaa12a24ceafab81226ef4817ecae8cb1c8192bac78571788b68061f
kernel-abi-stablelists-4.18.0-305.184.1.el8_4.noarch.rpm SHA-256: 4561122f715a1ea90da15ba5d1c1604550ce398be664d97dc8d42854e9879579
kernel-core-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 016b160bf5684c3315d4e90690d0c61f5db859b536dd6b76cdaa04f13261cc81
kernel-cross-headers-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 3a5fef97c21c932fba6bd3455ed523717c9e87825db2c3323cc78bd81b580ff3
kernel-debug-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 8e3bc33fb1af4ac2de3eef902da9cd1d76185fbaca674929ef5b2cb559fea132
kernel-debug-core-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: c3f6842c08636350d720da20f46523451269751a95d75f262c7b1bce56142096
kernel-debug-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 70ad5c62d2bc2f392cc61fbbb5197527bb45d79a7da9e93682a57e8073bc3f2a
kernel-debug-devel-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 310d56c01abe1f62df23e44e83c67b83307b9aa6b30c47c87c3811b9b1fc0149
kernel-debug-modules-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: ca75446d89c1e92b44d261e457978baa724a14f64297146daf07cc13ab1d84c0
kernel-debug-modules-extra-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 7231cbfaa127ad9aaf5802e5335b51839befcb0edaefbd2319e9072a7322933b
kernel-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: d5830aa1e40bfd9ad1b5e3f885754344e3869da4a134e8aafa10d0e6e180d031
kernel-debuginfo-common-x86_64-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 78291fab5789750743e975c2461707c044fa30b3f77c204e3d5becb8c4964ad4
kernel-devel-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 23e1c7d7a16222a7ad19b39ea2f39176d0bbbb43a0080f6ed0b4ced82b0aa9c1
kernel-doc-4.18.0-305.184.1.el8_4.noarch.rpm SHA-256: 3eb1ce97477074be6358f4c565959bbef51e53c977caf664424f6cd5daf623b6
kernel-headers-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: e6775bc5d181d64bfb227f44977f594b970fc58d0c71d64bf9667a78deb22e4b
kernel-modules-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 14835610286c0385f514630b9c0042bddb681f636947a0e671fbe4262f439276
kernel-modules-extra-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: e7065708b134034ee4b15b37aae87019bf0dcf19b67b25841d32771646ab5891
kernel-tools-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 8f1bc1d17166fd3a1036dd9d6f3e6dfb135e897676224d6d0b9eb141d2e44830
kernel-tools-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 4f9a85b56e122bb58ed55f4aa1cdfdd962020c21a525e1b51b8375d6742a73b0
kernel-tools-libs-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 0c0282f315655ca5297b7966d0e3ae54cb6d10faf69e3be2ac1f0c303e27cfcc
perf-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 6db124cfd9ae11ef02504995370c8c7f1ebb3616bf389ab298be95ce76d409e9
perf-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: ae8dbe721b323a7af36955a00f66d26298e5afcff120cd4af1626f09874150f6
python3-perf-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: b3f5e84f5c28702aa152cda8eb1446242dae59242b21fd130dfbd916ef20d27b
python3-perf-debuginfo-4.18.0-305.184.1.el8_4.x86_64.rpm SHA-256: 2179a4760f80e201206adcf8d91c482848020313124f1ebac70aa9cd4a6524a1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility