kernel-4.18.0-553.115.1.el8_10

エラータID: AXSA:2026-389:23

Release date: 
Thursday, April 2, 2026 - 18:49
Subject: 
kernel-4.18.0-553.115.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)
* kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)
* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-38180
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF.
CVE-2026-23204
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
CVE-2026-23209
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20 ping -c1 -I p1 1.2.3.4 He also gave a very detailed analysis: The issue is triggered when a new macvlan link is created with MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan port and register_netdevice() called from macvlan_common_newlink() fails (e.g. because of the invalid link name). In this case macvlan_hash_add_source is called from macvlan_change_sources() / macvlan_common_newlink(): This adds a reference to vlan to the port's vlan_source_hash using macvlan_source_entry. vlan is a pointer to the priv data of the link that is being created. When register_netdevice() fails, the error is returned from macvlan_newlink() to rtnl_newlink_create(): if (ops->newlink) err = ops->newlink(dev, &params, extack); else err = register_netdevice(dev); if (err < 0) { free_netdev(dev); goto out; } and free_netdev() is called, causing a kvfree() on the struct net_device that is still referenced in the source entry attached to the lower device's macvlan port. Now all packets sent on the macvlan port with a matching source mac address will trigger a use-after-free in macvlan_forward_source(). With all that, my fix is to make sure we call macvlan_flush_sources() regardless of @create value whenever "goto destroy_macvlan_port;" path is taken. Many thanks to valis for following up on this issue.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.115.1.el8_10.src.rpm
    MD5: f5c2c39e2dbd58ead2f13f96e2a0b1f1
    SHA-256: 0a04e9dc66b827dcebe1006df1ae2343937b95b27385a130d650789d12e83028
    Size: 132.36 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: e3753d07968e5e499f5cc18ce4a20571
    SHA-256: c5775d824712fbc5900146b5dc8196cf39f958889f0aea9d4d329bd1182a1487
    Size: 11.30 MB
  2. kernel-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: b00ddb0ee39d16bbceeb225cdbe2fe11
    SHA-256: a8cd55728baa5a03e773b493690727687034b8b5eb317840208e59f9c69ba2e1
    Size: 10.57 MB
  3. kernel-abi-stablelists-4.18.0-553.115.1.el8_10.noarch.rpm
    MD5: 709114c09c43cca43e8bd5982c7ba3b9
    SHA-256: 48b26a4d2c01e5490a323dd0ce89b087fc9ac6dc300188070dad94a939eee631
    Size: 10.59 MB
  4. kernel-core-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: ab8c264e583d53146436e0e38fd240fe
    SHA-256: abc1ae77994a94c251981a446439aa5a30c2551f0713d949b2ffeaaf2bd86257
    Size: 43.60 MB
  5. kernel-cross-headers-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: e3185988546b36a624758281d8dc9d99
    SHA-256: b52e3e65384afc7d19b8c18468fffb6e862a0e580bbbbdc0859117cd465ea305
    Size: 15.91 MB
  6. kernel-debug-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: a7cc42e8296f02764a8e35b141ed43b5
    SHA-256: 11b0a907008a6cd3fb42a1cbbbc0896558a912fdc1191079d6db0825ccc0dfac
    Size: 10.57 MB
  7. kernel-debug-core-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 1f4718f17b21a3dcfe91eeb69fe39f3a
    SHA-256: 5f6fd80315fe5cf6ca310e04bb8a0e7fc9efa2f80c71e26aafab3eb377d35ad9
    Size: 72.90 MB
  8. kernel-debug-devel-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: d8bff6f467a6b8ba453cdcf2a6043e24
    SHA-256: c166ec657269ca7d0a5546a1b0502f58a8d3ab80aaca06cb4c792081cf95b956
    Size: 24.41 MB
  9. kernel-debug-modules-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: afe0e4394c3356e34c5334a7f3df5577
    SHA-256: fad502946633bc89b257549a22f08d4e2dc7961cf3b67eb47a6f5e1de74cf00b
    Size: 66.03 MB
  10. kernel-debug-modules-extra-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: cf0fff9074dbd58b6264651267647d52
    SHA-256: 1b6ec16e2fc26d019dc06fd041de45f4eb5e41251530c24823d0468dd2ade7e3
    Size: 11.95 MB
  11. kernel-devel-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 00b09e135b5a0e2f72fabaa061ab287c
    SHA-256: 85fd5d6848d5861fcdf51a85ea27eadbe2d282c8bfcd23a52099004339e66403
    Size: 24.21 MB
  12. kernel-doc-4.18.0-553.115.1.el8_10.noarch.rpm
    MD5: 7c3eb86375414c0ee63df9f962f111ab
    SHA-256: 4d08020d2c69ebffd78d17c1ea399459275961e32176e1bc341b551e95f87ede
    Size: 28.44 MB
  13. kernel-headers-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: cbd54727c88acc54e155feccb4f3f559
    SHA-256: 41a4a88907de49558e97fd5ec2d586ec4b1a059dab9338d9238965c7937eae0a
    Size: 11.92 MB
  14. kernel-modules-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: dfd74ff01c3bce64b5ba9a95a0bbd87a
    SHA-256: 7d158ffdea8ae6caf4541a4b4e751066ba1597c63565b1fff35607685f907b84
    Size: 36.39 MB
  15. kernel-modules-extra-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: fb3ad39aaa855290d88175784a5b256b
    SHA-256: f1137e72e76910df39442a8ce4d132fb92c4edf94cd3fe81e6069a8ac9ce5f71
    Size: 11.26 MB
  16. kernel-tools-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 9469db2685ba9c51148d508b3854e81e
    SHA-256: 96b1fc019b4802f46e4c4bc70b0ef5335132fd6fbcd498d6486a5696655ed7cb
    Size: 10.79 MB
  17. kernel-tools-libs-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 7b3920243f0d7c374112c6e82d251e8a
    SHA-256: 461f94f3a24fe28ba46e208ab0e19b959d658c7a1b800ab1ade527b6157be55d
    Size: 10.58 MB
  18. kernel-tools-libs-devel-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 97046f10bb4933d7c51de04b83d0b09f
    SHA-256: 297f4e488701cd0ef2f257d22822dbcb8323dcdb0050263c38f856295cef14c9
    Size: 10.57 MB
  19. perf-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 1f960ea4d0ffe0a344d68f1d72947e85
    SHA-256: 825833d8bc0418893650a21fd4c2db07ff6063eff67c02397185e9f650c90b2b
    Size: 12.89 MB
  20. python3-perf-4.18.0-553.115.1.el8_10.x86_64.rpm
    MD5: 5d195cb83a0d77a8eadcc8d6a939fa10
    SHA-256: 2fe2607396d212375cbdaeddf8312b1d940299a3868472f0e6c9c5c1fbe9d78d
    Size: 10.69 MB