Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:6953 - Security Advisory
Issued:
2026-04-08
Updated:
2026-04-08

RHSA-2026:6953 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Linux kernel: Device Mapper RAID out-of-bounds access (CVE-2022-49674)
  • kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)
  • kernel: Linux kernel: integer overflow and information disclosure via undefined shift operation in drm/amdkfd (CVE-2021-4460)
  • kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64

Fixes

  • BZ - 2347967 - CVE-2022-49674 kernel: Linux kernel: Device Mapper RAID out-of-bounds access
  • BZ - 2376376 - CVE-2025-38180 kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem
  • BZ - 2400732 - CVE-2021-4460 kernel: Linux kernel: integer overflow and information disclosure via undefined shift operation in drm/amdkfd
  • BZ - 2439900 - CVE-2026-23209 kernel: macvlan: fix error recovery in macvlan_common_newlink()

CVEs

  • CVE-2021-4460
  • CVE-2022-49674
  • CVE-2025-38180
  • CVE-2026-23209

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.2

SRPM
kernel-4.18.0-193.193.1.el8_2.src.rpm SHA-256: a69491e294318f7c60a50031debb4330b5663c3f175254091e7b5c4bf1d24197
x86_64
bpftool-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 317366b2f85e44938e7b68265209bc3b3ab8e905fe641f82eb8b5520d0f2dcda
bpftool-debuginfo-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 62486b0594bab2ddf74d709162c4b246240737e279b8db356b07a65bae554e3c
kernel-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 25863d71eb0ae723c3dafbca84f5bee652c2145ccf83936fabfd45c9f80dacba
kernel-abi-whitelists-4.18.0-193.193.1.el8_2.noarch.rpm SHA-256: 477c47aa929ffc450065a8f92d41477acde9a82eabeeb9659bbbe7bcd1ef4142
kernel-core-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: cb789930fff467eb0984b7439ebd629494d5f699bb002ba47455b512e85a80ee
kernel-cross-headers-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: f88f8042e93e4bfb5aa83f3da2e99df6b218737501b9a1088c1490d4cbb80b9c
kernel-debug-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: bbb96279c16ba65f3fd000e5c7e73853a6f2588c41402ba95d920aa9f65b5004
kernel-debug-core-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 6db0bf54dc89d730750231208ab6c3871ccba34896f74c19802d38893c80b05e
kernel-debug-debuginfo-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 005aac98797d20ebf7c57b3a2edae8f6a775083e09b565720f7e07252e0a29cc
kernel-debug-devel-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 70306cb82bac3f85619d6234b1b3a45cd1453b618a81bdfb62f5b9b6d7b7f52d
kernel-debug-modules-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 43075b3dc5812f9ce95dba4673fb2a42ebe5e1da13e280707a08eb269313c116
kernel-debug-modules-extra-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: a6258c215922763d7b897863214d0818c96114b48d2741600932f9135d138acb
kernel-debuginfo-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 3c40add206d807ac95a29ee1f70c1f46dbb33d2b60e05241b3703c58b607ed6b
kernel-debuginfo-common-x86_64-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 2104ca8e183f270cbf91e4c7dfc7e2f11f72b2dc3089fa6df92ead6aea5b7772
kernel-devel-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: f4e0e7e6595509bc11c6214e35e6623923878543e9254dc10dbac3218c74fb47
kernel-doc-4.18.0-193.193.1.el8_2.noarch.rpm SHA-256: b9fb1e39ba395173f6d4d44c437d1c384bd3ca21f2f9ac5cb4ff0b750a7b3e11
kernel-headers-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 8bb8a2093f9e1de1af917d4a0238997f9cebda4ac27f2eb9ebbcc93b9a9ee8db
kernel-modules-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 6c788704ea668c15f6fa2d25f90b19d90ded966442778244cddbf7877fd6ef62
kernel-modules-extra-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 31796875124bea5a5c3e2f2b6c4c239b4c0ad259e51c9857f950ec541b3d95f5
kernel-tools-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: 312196448cb267ecb3238f1e3ef80beafcdbd7f10b88e3545df7013c8a99e5d9
kernel-tools-debuginfo-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: d686848ab6ea573fed8e03f0ccb20f49ad04481a1af27f7d8653200860d8a0e4
kernel-tools-libs-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: f139332c3946aba60744210bd1d670600717815cb226e150cfcbad77fe7dfb46
perf-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: ebd951ddbe0338645ba1419c2d0dfc7b08247fbdb20c536b129ca31aacbee58d
perf-debuginfo-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: f87252b10d773eb628d61827b69c8b494612819c6422eb692fb75774ff138a8f
python3-perf-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: d304ff4a51f7647567dade61ec6e29e66c443a314decb8137a503821b73b1319
python3-perf-debuginfo-4.18.0-193.193.1.el8_2.x86_64.rpm SHA-256: af05131195c39d535781f80429bdc397405f5604060c43fc6bb9feab6070b196

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility