Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2664 - Security Advisory
Issued:
2026-02-12
Updated:
2026-02-12

RHSA-2026:2664 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: cifs: fix oops during encryption (CVE-2022-50341)
  • kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)
  • kernel: net/mlx5e: Check for NOT_READY flag state after locking (CVE-2023-53581)
  • kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154)
  • kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service. (CVE-2025-40304)
  • kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322)
  • kernel: ext4: fix use-after-free in ext4_orphan_cleanup (CVE-2022-50673)
  • kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state (CVE-2023-53833)
  • kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301)
  • kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (CVE-2025-68349)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64

Fixes

  • BZ - 2395879 - CVE-2022-50341 kernel: cifs: fix oops during encryption
  • BZ - 2401510 - CVE-2023-53539 kernel: RDMA/rxe: Fix incomplete state save in rxe_requester
  • BZ - 2401545 - CVE-2023-53581 kernel: net/mlx5e: Check for NOT_READY flag state after locking
  • BZ - 2414494 - CVE-2025-40154 kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
  • BZ - 2419870 - CVE-2025-40304 kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
  • BZ - 2419902 - CVE-2025-40322 kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
  • BZ - 2420347 - CVE-2022-50673 kernel: ext4: fix use-after-free in ext4_orphan_cleanup
  • BZ - 2420366 - CVE-2023-53833 kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state
  • BZ - 2422836 - CVE-2025-68301 kernel: net: atlantic: fix fragment overflow handling in RX path
  • BZ - 2424880 - CVE-2025-68349 kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid

CVEs

  • CVE-2022-50341
  • CVE-2022-50673
  • CVE-2023-53539
  • CVE-2023-53581
  • CVE-2023-53833
  • CVE-2025-40154
  • CVE-2025-40304
  • CVE-2025-40322
  • CVE-2025-68301
  • CVE-2025-68349

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.2

SRPM
kernel-4.18.0-193.185.1.el8_2.src.rpm SHA-256: e1f61addf8ccfe0668fd11b7d897e24789f5016e950f2b718effadf3e7ceef3d
x86_64
bpftool-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 0f00aff42d6da748b67b5367559a38230866c86f2cc4cfaaf1b0d84cc6b1fb0c
bpftool-debuginfo-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 4280ea1115c212068171a7e4ec27f9e228b96b9a33d7c7fa82df85fa35a55f81
kernel-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: e42f5eed9eaee08c0307fd585e198dbca84b33ec0aa37bb804e56ac366ecec38
kernel-abi-whitelists-4.18.0-193.185.1.el8_2.noarch.rpm SHA-256: e6a441e514a093c626e034054cc0668492d75da7eb8fe3357720fe7de6d792a0
kernel-core-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: b6f9a3d36a3f790e3c7ea7471f617b93b9b34ab20e012d7cb3eb8da44f7e37ac
kernel-cross-headers-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 066b3c541820b70f845b3f78bc9c039e7bd78c06486505f7065b88cd2744b295
kernel-debug-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: e0afeaa52294d741c4d1b6e9eb3976994ad52300867c41edd41334f88708ca6c
kernel-debug-core-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 999938e865302b3a673dbf2c832b6ed348a319cccf802554615b2610e02ea84b
kernel-debug-debuginfo-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 7f3bc796fb3d63bb379e701318d9654f5aba488f2dc3fb184b875df53287156c
kernel-debug-devel-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 42f2d8dbf20d7a31379c86f540cd1a00248cd8018d3099d13ec89853138936ac
kernel-debug-modules-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: f8979852286f9304f71d5adb4d21a66b9946a3cf239985c739c2e09487d0b585
kernel-debug-modules-extra-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 9ba114778f25c47a70a828f14b4e0ce8d7b324c06729b14bfac19cc2a23baf83
kernel-debuginfo-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 66aa9480b1989d1c0bb5c6f55fbe26c48128d1131ce449e046c7ab9b3fa2481f
kernel-debuginfo-common-x86_64-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 36866842493e246ad021c747c741a27b9b353842be050164f6d1f2de0a22c62e
kernel-devel-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: c4448fee70debd6493a7e17a9da23daa90d453968b52afc184d92a1f87dd9ce2
kernel-doc-4.18.0-193.185.1.el8_2.noarch.rpm SHA-256: 4afb1629672b5618ac39ac23fbc4de59c82c05a03055a507e4b7b0532a5c6eab
kernel-headers-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 930b10eb1a3158a79a57977b0a1aeac13f54fe43514345fc33b93cbce7fe3ea8
kernel-modules-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: a1fe156ac0a417c5f17609dcfe4be7efe51608ffb850287c54cdefa47364e3c9
kernel-modules-extra-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 89689e5c43af4db112a2c8d98ee23f94b6f7e27e16c906a65e7017c99f4fffe3
kernel-tools-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 7c3ab4ddc47dd3a98426343f33a088b7e51892cc73cf4743d7124774c419d9aa
kernel-tools-debuginfo-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 13c1ab1e895fed82eab3615e21a88121a8c6e2a3d9751258c66fb841d29f2d75
kernel-tools-libs-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: ea745fdae652aca5763ad949c3fd01a42eddf5e7f1309de3e5567424697f51dc
perf-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 326b055c146cb1dda642db245e08c652abf410bce9d65cd5dcc9278b7c5f7517
perf-debuginfo-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 0d6cd305d8eaf846f950176bbe4bdc59267b62753bc3c8ac9fe3544a5fc709a6
python3-perf-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: eb81d73df2bc40bbc35b700aff6b6228a580130a577f01477615716939c4177e
python3-perf-debuginfo-4.18.0-193.185.1.el8_2.x86_64.rpm SHA-256: 96258bcdb6f3111ad059c4a3f79577ec7648d5dddb02d077d7a29f6952c426da

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility