Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:5727 - Security Advisory
Issued:
2026-03-25
Updated:
2026-03-25

RHSA-2026:5727 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution (CVE-2025-38024)
  • kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)
  • kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (CVE-2025-71085)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64

Fixes

  • BZ - 2373354 - CVE-2025-38024 kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution
  • BZ - 2418832 - CVE-2025-40240 kernel: sctp: avoid NULL dereference when chunk data buffer is missing
  • BZ - 2429026 - CVE-2025-71085 kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()

CVEs

  • CVE-2025-38024
  • CVE-2025-40240
  • CVE-2025-71085

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.2

SRPM
kernel-4.18.0-193.190.1.el8_2.src.rpm SHA-256: 0b183a81e254a3953dafb2bb2f520bcc46fc8a4ea34152ef28b68a35f22ba814
x86_64
bpftool-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: e13bd711c8903f2ae6e2a3a302e32189a5df04d1f76814de9c1f346e9f483c51
bpftool-debuginfo-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 6ffb0324df9a16313c2b55c16692151ca35977ad5cd0d55b8b7cd886e339441a
kernel-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 1559e4bfba1bc2ddf7c9619d0e25fa0d72d053cd819837b319aa89a7b63d1fff
kernel-abi-whitelists-4.18.0-193.190.1.el8_2.noarch.rpm SHA-256: 6fa49ddb8436bdd64c4efbc7f729ffcc181b0c1ac1b6baf232a3e7e6f1ce2245
kernel-core-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: c0dbff365c3b1b2773306666bb8056abe149d05a6c66624f51bae51ba22347e2
kernel-cross-headers-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: f0adb6f4023291aeeb0d41e16db3289660e12c691021865c33b5daf19d32d61d
kernel-debug-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 19dc613d154a43bbc821ed143593ec48bac98077348c12e075aa34ec128d9677
kernel-debug-core-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: cd7cff4df9e3855b4c543bca0a62375eabe56b7229e8bfa80e0a8c1e2f2da0be
kernel-debug-debuginfo-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: e2181d47b57994cc119e0314639b32f28396f8d23a774747bc779d6d59954b71
kernel-debug-devel-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 95ea7a4e1ae7de841b0a782f54729c2b015e3bdf395ad7b0d3f14499fec72dee
kernel-debug-modules-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 215ad81ed9147cf66b5c445e533b3ff356f195d5a2ace1676a2b47bd40127aca
kernel-debug-modules-extra-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 7131fa0fb012bebf5eb91d2d0908de7a2c7f22cad11f7b1833a62250f564d3a7
kernel-debuginfo-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 0e7408481427a6f458f7b9ee73dc05d0cf7135dba57c0a4ac8036de6b6446695
kernel-debuginfo-common-x86_64-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 6b38e37f6467954672f72f5e646135cce0ebc7a85115e2f9f82df02ae1a05609
kernel-devel-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: ae690d005d3b0c7c6df6712b53d48b42bc695c2ad753b6352ad5a9d07f9fe447
kernel-doc-4.18.0-193.190.1.el8_2.noarch.rpm SHA-256: 0047b88ed89ce6735e7d11f18d74161f49717efa71d6c444112f05e534639946
kernel-headers-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 5982591b10d80fe6a78e09821a425ccc54d984432aa72c552289592695e94c59
kernel-modules-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: d19357d93b1b04ad839edc2c94f4827bd97e25f60c90357de25acbe08a4d197b
kernel-modules-extra-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 308faa2847e6cfba5f17c08d49174f724ddd12d6b5205a0e935645ada9913538
kernel-tools-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 1c56df6c9c84ab973405d4ddcbe979854ff08788e92a3d110a9361f7056b7db3
kernel-tools-debuginfo-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: f3b614cdfde8cf03963e44492b506760f221776b17e509908a7bfe931c33f23d
kernel-tools-libs-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: d44c449de99dbfd7437aed78c29ed4612b3a52588b0af138d5d4ee368e5d4d7a
perf-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 4d2b6e5df986f571435a5c62968304813ff5835aa958b8f30c31cb82049d81e9
perf-debuginfo-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: 63febc4aac21b5880246ce1ddc44592d87512eded8eecf90602aa07ec9dea1d9
python3-perf-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: d232aaf8ac64cb0f1a442fc41dd42a6ed56d179f83ddcd6775d431c30581b491
python3-perf-debuginfo-4.18.0-193.190.1.el8_2.x86_64.rpm SHA-256: e83df16dc7845033ddc95dc2f852bbd79e9d516d34f7acbd01208ba023d2ae5a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility