kernel-4.18.0-553.117.1.el8_10

エラータID: AXSA:2026-414:26

Release date: 
Friday, April 10, 2026 - 15:21
Subject: 
kernel-4.18.0-553.117.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)
* kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)
* kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)
* kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. (CVE-2025-71238)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-26984
In the Linux kernel, the following vulnerability has been resolved: nouveau: fix instmem race condition around ptr stores Running a lot of VK CTS in parallel against nouveau, once every few hours you might see something like this crash. BUG: kernel NULL pointer dereference, address: 0000000000000008 PGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27 Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021 RIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau] Code: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee <48> 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1 RSP: 0000:ffffac20c5857838 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001 RDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180 RBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10 R10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c R13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c FS: 00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ... ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau] ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau] nvkm_vmm_iter+0x351/0xa20 [nouveau] ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau] ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] ? __lock_acquire+0x3ed/0x2170 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau] ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau] ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] nvkm_vmm_map_locked+0x224/0x3a0 [nouveau] Adding any sort of useful debug usually makes it go away, so I hand wrote the function in a line, and debugged the asm. Every so often pt->memory->ptrs is NULL. This ptrs ptr is set in the nv50_instobj_acquire called from nvkm_kmap. If Thread A and Thread B both get to nv50_instobj_acquire around the same time, and Thread A hits the refcount_set line, and in lockstep thread B succeeds at refcount_inc_not_zero, there is a chance the ptrs value won't have been stored since refcount_set is unordered. Force a memory barrier here, I picked smp_mb, since we want it on all CPUs and it's write followed by a read. v2: use paired smp_rmb/smp_wmb.
CVE-2025-71238
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1 [5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025 [5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10 [5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246 [5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000 [5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000 [5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000 [5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090 [5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000 [5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000 [5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0 [5353358.825221] PKRU: 55555554 [5353358.825222] Call Trace: [5353358.825223] [5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df [5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df [5353358.825232] ? sg_copy_buffer+0xc8/0x110 [5353358.825236] ? __die_body.cold+0x8/0xd [5353358.825238] ? page_fault_oops+0x134/0x170 [5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110 [5353358.825244] ? exc_page_fault+0xa8/0x150 [5353358.825247] ? asm_exc_page_fault+0x22/0x30 [5353358.825252] ? memcpy_erms+0x6/0x10 [5353358.825253] sg_copy_buffer+0xc8/0x110 [5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx] [5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx] Most routines in qla_bsg.c call bsg_done() only for success cases. However a few invoke it for failure case as well leading to a double free. Validate before calling bsg_done().
CVE-2026-23193
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the session release path) may wake up and free the iscsit_session structure immediately. This creates a race condition where the current thread may attempt to execute spin_unlock_bh() on a session structure that has already been deallocated, resulting in a KASAN slab-use-after-free. To resolve this, release the session_usage_lock before calling complete() to ensure all dereferences of the sess pointer are finished before the waiter is allowed to proceed with deallocation.
CVE-2026-23231
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy() with no RCU grace period in between. This creates two use-after-free conditions: 1) Control-plane: nf_tables_dump_chains() traverses table->chains under rcu_read_lock(). A concurrent dump can still be walking the chain when the error path frees it. 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly installs the IPv4 hook before IPv6 registration fails. Packets entering nft_do_chain() via the transient IPv4 hook can still be dereferencing chain->blob_gen_X when the error path frees the chain. Add synchronize_rcu() between nft_chain_del() and the chain destroy so that all RCU readers -- both dump threads and in-flight packet evaluation -- have finished before the chain is freed.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.117.1.el8_10.src.rpm
    MD5: 564e24352fe4f8021ecdba9763caf40d
    SHA-256: 2dc49e741c734795180c0c125df3c0973af91128e055236653279c98f7116fea
    Size: 132.38 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: d504241d0a62048fa69d5f85a5d933be
    SHA-256: 329260d7d411d6a5b650d5b69a0d3c00b5ec190df23c633c19d17c5ebc312acb
    Size: 11.30 MB
  2. kernel-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 60be63d5d0a2ee97912310a4c0bb14ee
    SHA-256: 7471ba5efa52cfc8432d40531e831b385032ef5a2814719594fd0ef6c0bd3480
    Size: 10.57 MB
  3. kernel-abi-stablelists-4.18.0-553.117.1.el8_10.noarch.rpm
    MD5: 368730924221bba97be705d4aa002e55
    SHA-256: 598eefa96d12fb67e45faa97de1d98747f721e57057327b54e803c931f098415
    Size: 10.59 MB
  4. kernel-core-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 43bbf18988c169593bda23d210de9c07
    SHA-256: 717931201d40b51bc59fe758994f0043f75811c868bb1ca2eb6c0ac85a7e8e04
    Size: 43.62 MB
  5. kernel-cross-headers-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 9492d897bad60186973f79c4a212872e
    SHA-256: 4b9456ff6387f65133f959eb373d63119f990c57909cc7908760ed9fc5b3d425
    Size: 15.92 MB
  6. kernel-debug-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: d7b249e741b01f04ce8cdda080a1b093
    SHA-256: 81d933529c69173b41b299cd35f58610aa9531add319c4db653eede8b2629a58
    Size: 10.57 MB
  7. kernel-debug-core-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 1684ea8a3127eaeabffa3299f2ec968f
    SHA-256: 6c7774313bbf1640ec1ffebf98111f48b2272c85ca09e2f71d7da169e33f51bb
    Size: 72.91 MB
  8. kernel-debug-devel-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 0ec3eaa13e22515be148164f4d79b474
    SHA-256: 3b4407098c42492364e8e3e17a14200419fabf0f7e4f58c68203f27ea4394d07
    Size: 24.41 MB
  9. kernel-debug-modules-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: f48121b4762c286a3560c7e2b22202fb
    SHA-256: b0244857bc69353984addbd7a30300c4030b619b20d8da3c11add94650a374db
    Size: 66.02 MB
  10. kernel-debug-modules-extra-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 3e2fb194d25904fd46d6ab4b82a80003
    SHA-256: 12ec288c773ec9b6904b1198d3b834ad12c7386bf6745035ad23606ae747aa8d
    Size: 11.95 MB
  11. kernel-devel-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: ba241ab551c7407e999c8b0f1104ebf4
    SHA-256: f8a71ddb8981448225f90d2b85efeb0208d235d229d66f14c797a90f813928c8
    Size: 24.21 MB
  12. kernel-doc-4.18.0-553.117.1.el8_10.noarch.rpm
    MD5: a0cf1e5ec16ecd65ab3394b52b865e6e
    SHA-256: de8c67c5f8bbaee13da4fbbdf595ad3ab45156b0f18c328489358f36f6a211a1
    Size: 28.44 MB
  13. kernel-headers-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 3c39daed566a728c5465293bd7b72941
    SHA-256: ae3360438a937073d8eac9c9b0c8043b7b742fb1db0bdfcc080589703c2c821c
    Size: 11.92 MB
  14. kernel-modules-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 741af544832bd9531701fd6262464c44
    SHA-256: fc7598692b4b3fbd2fcf06252c3ad47f70c0a813c4b7f59d0c6bb46d50cf2a9a
    Size: 36.40 MB
  15. kernel-modules-extra-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 203669c55d5e964ab73f725fa2412742
    SHA-256: af47a14856cc0d4512a39fbf6fffa6d747d1621c48bf8f6cceedf9c41d0691e4
    Size: 11.26 MB
  16. kernel-tools-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 0f7c1098b01876141daea458871f0e34
    SHA-256: 77aeba1475c8e5f9323bb7b6f9ef0ef77f07452064de99dc10ee127e91dc3b22
    Size: 10.79 MB
  17. kernel-tools-libs-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 076a7336c8555824a4b4cb94eae10cc9
    SHA-256: 36cbc272f3eeff32b6925371b8417e6d6236be72d585e1214f45fb2cb04050b2
    Size: 10.58 MB
  18. kernel-tools-libs-devel-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 42bbdebbc366be5d2ff77e937d5856fe
    SHA-256: c21ae245231e022ebb67f5e86d438449bf112fabb8de94de6d017ce2e901c911
    Size: 10.57 MB
  19. perf-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 5428486b6326eaad777a8046f9667cfb
    SHA-256: 8d7e672df8d03668f4d743c1aa57ccd94835a5e6830a879f340036d687a1dd62
    Size: 12.89 MB
  20. python3-perf-4.18.0-553.117.1.el8_10.x86_64.rpm
    MD5: 34e90f5c247a0e208ee3c1c00376b54f
    SHA-256: 29f1e0e014eee3e8a9d80113c24ce918b6b2f5d37700b3a422f78f5dbd4f79d9
    Size: 10.70 MB