kernel-4.18.0-553.97.1.el8_10

エラータID: AXSA:2026-097:05

Release date: 
Friday, January 30, 2026 - 09:06
Subject: 
kernel-4.18.0-553.97.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Bluetooth: hci_event: call disconnect callback before deleting conn (CVE-2023-53673)
* kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154)
* kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)
* kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-53673
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 000000001696f1fd handle 2560 hci_conn_unlink:1102: hci0: hcon 000000001696f1fd hci_conn_drop:1451: hcon 00000000d8521aaf orig refcnt 2 hci_chan_list_flush:2780: hcon 000000001696f1fd hci_dev_put:1487: hci0 orig refcnt 21 hci_dev_put:1487: hci0 orig refcnt 20 hci_req_cmd_complete:3978: opcode 0x0406 status 0x0c ... ... iso_sock_sendmsg:1098: sock 00000000dea5e2e0, sk 00000000eabd6557 BUG: kernel NULL pointer dereference, address: 0000000000000668 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP PTI Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 RIP: 0010:iso_sock_sendmsg (net/bluetooth/iso.c:1112) bluetooth ========================================================== L2CAP: ================================================================== hci_cmd_status_evt:4359: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3085: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon ffff88800c999000 handle 3585 hci_conn_unlink:1102: hci0: hcon ffff88800c999000 hci_chan_list_flush:2780: hcon ffff88800c999000 hci_chan_del:2761: hci0 hcon ffff88800c999000 chan ffff888018ddd280 ... BUG: KASAN: slab-use-after-free in hci_send_acl+0x2d/0x540 [bluetooth] Read of size 8 at addr ffff888018ddd298 by task bluetoothd/1175 CPU: 0 PID: 1175 Comm: bluetoothd Tainted: G E 6.4.0-rc4+ #2 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 Call Trace: dump_stack_lvl+0x5b/0x90 print_report+0xcf/0x670 ? __virt_addr_valid+0xf8/0x180 ? hci_send_acl+0x2d/0x540 [bluetooth] kasan_report+0xa8/0xe0 ? hci_send_acl+0x2d/0x540 [bluetooth] hci_send_acl+0x2d/0x540 [bluetooth] ? __pfx___lock_acquire+0x10/0x10 l2cap_chan_send+0x1fd/0x1300 [bluetooth] ? l2cap_sock_sendmsg+0xf2/0x170 [bluetooth] ? __pfx_l2cap_chan_send+0x10/0x10 [bluetooth] ? lock_release+0x1d5/0x3c0 ? mark_held_locks+0x1a/0x90 l2cap_sock_sendmsg+0x100/0x170 [bluetooth] sock_write_iter+0x275/0x280 ? __pfx_sock_write_iter+0x10/0x10 ? __pfx___lock_acquire+0x10/0x10 do_iter_readv_writev+0x176/0x220 ? __pfx_do_iter_readv_writev+0x10/0x10 ? find_held_lock+0x83/0xa0 ? selinux_file_permission+0x13e/0x210 do_iter_write+0xda/0x340 vfs_writev+0x1b4/0x400 ? __pfx_vfs_writev+0x10/0x10 ? __seccomp_filter+0x112/0x750 ? populate_seccomp_data+0x182/0x220 ? __fget_light+0xdf/0x100 ? do_writev+0x19d/0x210 do_writev+0x19d/0x210 ? __pfx_do_writev+0x10/0x10 ? mark_held_locks+0x1a/0x90 do_syscall_64+0x60/0x90 ? lockdep_hardirqs_on_prepare+0x149/0x210 ? do_syscall_64+0x6c/0x90 ? lockdep_hardirqs_on_prepare+0x149/0x210 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7ff45cb23e64 Code: 15 d1 1f 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d 9d a7 0d 00 00 74 13 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89 RSP: 002b:00007fff21ae09b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: ---truncated---
CVE-2025-40154
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logic for unconnected sockets: they don't linger, can't be placed in a sockmap, are rejected by sendmsg(). [1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox... [2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8... [3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox...
CVE-2025-40277
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.97.1.el8_10.src.rpm
    MD5: 2a84376e19841748ebf83f30491be1e3
    SHA-256: 9a74360cfed89eb60208dbd55bf9964c7a7a0275170a6647a9baf3ec393dce59
    Size: 132.33 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 20d8618d2f172f9e0134c4684412270a
    SHA-256: a74416c7120dc519b91e401003a4a33afb608af02712975eb4184e36122bdff7
    Size: 11.27 MB
  2. kernel-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 49a1ec2375913ed70e7d0227b3ea0679
    SHA-256: 0c67728bcf711b99d97728689eef0dd242245704ae90a16b3af85dd80ed5b9aa
    Size: 10.55 MB
  3. kernel-abi-stablelists-4.18.0-553.97.1.el8_10.noarch.rpm
    MD5: 1e664eb5da5d9adaf10a69c7ff4f265f
    SHA-256: 174484e96c480a2a131011803cf4bd99fc8a448ba40d4fb0629b2f3e5d3367e4
    Size: 10.56 MB
  4. kernel-core-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: cb595d50bdb64680cc51e2c3402c5bd1
    SHA-256: a9db19f878e6f77777df6615e0eae386804bceb1a918fd0a92444769e5957fc4
    Size: 43.58 MB
  5. kernel-cross-headers-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 16924f00a63b108ac15aa24580f52db4
    SHA-256: fdac68ec346fe3b6164d77eaf83deca40bd2fdf748693fe2b48e438087013b9a
    Size: 15.89 MB
  6. kernel-debug-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 3ca4aba4aaa38f57d7bcf77bd54b9171
    SHA-256: 9be16a5a265f079488fdefcac7a26d753ec2211c3cf9b09b35f8bf3a177d21a0
    Size: 10.55 MB
  7. kernel-debug-core-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: e48df75188cbd0062c83c4a88211e061
    SHA-256: e049c0922b67cdeca879eb42081b4dd43b8d474ebe65d7b561ec696932823686
    Size: 72.87 MB
  8. kernel-debug-devel-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 4f76617248aa1637a11b674bc8ece067
    SHA-256: 4ea53c2d70dd7c74da44a5b4959dcb4e852a564f3994a45b793333e38d236130
    Size: 24.38 MB
  9. kernel-debug-modules-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: d08469a0ba5b297898e007435b4ffaf6
    SHA-256: 0c5372da7b7b94a966f5334b09771709fb323774e2c339e105910dd5a732d390
    Size: 66.00 MB
  10. kernel-debug-modules-extra-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 37a5efee1f4e173897025d283264a8e4
    SHA-256: 9afd3348ffb8daa7121cbaea8ed42a748535f71c745b56e65df3f6db849130f9
    Size: 11.92 MB
  11. kernel-devel-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 1c17fd7fa7d5a3466f834d55b1df81c5
    SHA-256: a3127551624b461f8239a56614c8553e677e6d8b4677f8824ea7ae692a578cfd
    Size: 24.18 MB
  12. kernel-doc-4.18.0-553.97.1.el8_10.noarch.rpm
    MD5: 91ae227471e5884e8c9ae4c52a5e8257
    SHA-256: e1955966394b5f38f6134d56b35f8d0ac31c3507a7fa393ddc239942aa1850bc
    Size: 28.42 MB
  13. kernel-headers-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 73f3e7664d54dafc7aa4457883750198
    SHA-256: 6938d0458fe5e4446a1cf2c3c8e3bb78036afa0448fed04111f89577e0da9e1e
    Size: 11.90 MB
  14. kernel-modules-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 5d538b96f629b70f7aaaad64becd9bb6
    SHA-256: 2272c6df82ba156e38730fb64da1abf7ed37503ea4cc4dad00bc63939eb3d667
    Size: 36.38 MB
  15. kernel-modules-extra-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 6221f0b5b1cfe8b3e378479ca45e5d1f
    SHA-256: 737e9b3caef23f743c341714dccfa884d6c31aa3df19602e734673fb7352dfeb
    Size: 11.24 MB
  16. kernel-tools-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 24844317cc214b1249dd433b1d70ca25
    SHA-256: 0b9787bc1a953dcd0d2665d6a33acdef5278b1a57664cee4fed7407228bd364b
    Size: 10.77 MB
  17. kernel-tools-libs-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 94d07b27da97c80eb361b06c32940c36
    SHA-256: 8cc3528af39b09d093f819dc7888d29072c1f84a8df6f26f87004b718b66dca3
    Size: 10.56 MB
  18. kernel-tools-libs-devel-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 9cc2aee144ea99d2697a2c3ed1fb5226
    SHA-256: f05f8f034d7f0726075cf34f00c786ae2d11e0e4f771ca8e691f5732463bfcfa
    Size: 10.55 MB
  19. perf-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: 1e2a8dac474803467e4519bf824c68a9
    SHA-256: 12302228f3fc131cc1e58eb09da61dbe5aec0ea929a411911552cd9bbe7071d6
    Size: 12.87 MB
  20. python3-perf-4.18.0-553.97.1.el8_10.x86_64.rpm
    MD5: f7b20380ca9547c30efd8a6c830a5a20
    SHA-256: 47c6e8611eb0db21e8c08232ac315de9216c99c591d0e7b32cea8fb8a20b5376
    Size: 10.67 MB