kernel-4.18.0-553.123.1.el8_10
エラータID: AXSA:2026-612:33
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: nvme: avoid double free special payload (CVE-2024-41073)
* kernel: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (CVE-2025-40252)
* kernel: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (CVE-2025-68724)
* kernel: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache (CVE-2026-31402)
* kernel: Linux kernel KVM: Privilege escalation or denial of service due to improper shadow page table entry handling (CVE-2026-23401)
* kernel: crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)
* kernel: "Dirty Frag" is a new universal Local Privilege Escalation (LPE) vulnerability in the Linux kernel (CVE-2026-43284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-41073
In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retried, and that retry may fail before a new special payload is added, a double free will result. Clear the RQF_SPECIAL_LOAD when the request is cleaned.
CVE-2025-40252
In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition. If the terminator was missing or malformed, the loop could run past the end of the fixed-size array. Add an explicit bound check using ARRAY_SIZE() in both loops to prevent a potential out-of-bounds access. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-68724
In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check_add_overflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetric_key_id structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a possible buffer overflow when copying data from potentially malicious X.509 certificate fields that can be arbitrarily large, such as ASN.1 INTEGER serial numbers, issuer names, etc.
CVE-2026-23401
In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE When installing an emulated MMIO SPTE, do so *after* dropping/zapping the existing SPTE (if it's shadow-present). While commit a54aa15c6bda3 was right about it being impossible to convert a shadow-present SPTE to an MMIO SPTE due to a _guest_ write, it failed to account for writes to guest memory that are outside the scope of KVM. E.g. if host userspace modifies a shadowed gPTE to switch from a memslot to emulted MMIO and then the guest hits a relevant page fault, KVM will install the MMIO SPTE without first zapping the shadow-present SPTE. ------------[ cut here ]------------ is_shadow_present_pte(*sptep) WARNING: arch/x86/kvm/mmu/mmu.c:484 at mark_mmio_spte+0xb2/0xc0 [kvm], CPU#0: vmx_ept_stale_r/4292 Modules linked in: kvm_intel kvm irqbypass CPU: 0 UID: 1000 PID: 4292 Comm: vmx_ept_stale_r Not tainted 7.0.0-rc2-eafebd2d2ab0-sink-vm #319 PREEMPT Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:mark_mmio_spte+0xb2/0xc0 [kvm] Call Trace: mmu_set_spte+0x237/0x440 [kvm] ept_page_fault+0x535/0x7f0 [kvm] kvm_mmu_do_page_fault+0xee/0x1f0 [kvm] kvm_mmu_page_fault+0x8d/0x620 [kvm] vmx_handle_exit+0x18c/0x5a0 [kvm_intel] kvm_arch_vcpu_ioctl_run+0xc55/0x1c20 [kvm] kvm_vcpu_ioctl+0x2d5/0x980 [kvm] __x64_sys_ioctl+0x8a/0xd0 do_syscall_64+0xb5/0x730 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x47fa3f ---[ end trace 0000000000000000 ]---
CVE-2026-31402
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request.
CVE-2026-31431
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
CVE-2026-43284
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().
Update packages.
In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retried, and that retry may fail before a new special payload is added, a double free will result. Clear the RQF_SPECIAL_LOAD when the request is cleaned.
In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition. If the terminator was missing or malformed, the loop could run past the end of the fixed-size array. Add an explicit bound check using ARRAY_SIZE() in both loops to prevent a potential out-of-bounds access. Found by Linux Verification Center (linuxtesting.org) with SVACE.
In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check_add_overflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetric_key_id structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a possible buffer overflow when copying data from potentially malicious X.509 certificate fields that can be arbitrarily large, such as ASN.1 INTEGER serial numbers, issuer names, etc.
In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE When installing an emulated MMIO SPTE, do so *after* dropping/zapping the existing SPTE (if it's shadow-present). While commit a54aa15c6bda3 was right about it being impossible to convert a shadow-present SPTE to an MMIO SPTE due to a _guest_ write, it failed to account for writes to guest memory that are outside the scope of KVM. E.g. if host userspace modifies a shadowed gPTE to switch from a memslot to emulted MMIO and then the guest hits a relevant page fault, KVM will install the MMIO SPTE without first zapping the shadow-present SPTE. ------------[ cut here ]------------ is_shadow_present_pte(*sptep) WARNING: arch/x86/kvm/mmu/mmu.c:484 at mark_mmio_spte+0xb2/0xc0 [kvm], CPU#0: vmx_ept_stale_r/4292 Modules linked in: kvm_intel kvm irqbypass CPU: 0 UID: 1000 PID: 4292 Comm: vmx_ept_stale_r Not tainted 7.0.0-rc2-eafebd2d2ab0-sink-vm #319 PREEMPT Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:mark_mmio_spte+0xb2/0xc0 [kvm] Call Trace:
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request.
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().
N/A
SRPMS
- kernel-4.18.0-553.123.1.el8_10.src.rpm
MD5: b124a7278a87556edd07c9df4adcc962
SHA-256: 1968baa391a9a4e18ce996d1835c7d794b2c473a104194afca406e0a09103672
Size: 132.37 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 3d181f83967f59a9b553d7efdb1dc023
SHA-256: 28408d8462da942056da358f2b64ca28603ac4b1959974fb18f8e91d942265e1
Size: 11.30 MB - kernel-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: fb40d72f04c89b46e4200bf9a73e2578
SHA-256: a36ca2c11c7602d9e987ce3e560ac70adb8547fd9c06c01416b0fafb434ad9bd
Size: 10.58 MB - kernel-abi-stablelists-4.18.0-553.123.1.el8_10.noarch.rpm
MD5: 042d85c3cd84b12f1218695fc2cb74b9
SHA-256: fb7dc1accf0eac51c182d3875fa7bc3509d53f02c8c90a1bf7857df767cba9b6
Size: 10.59 MB - kernel-core-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 8a8f14db7fc84fea86c6eb7a1b18793f
SHA-256: ca4eb3b359328727a92eae32383e7ae84599e794812d96fa8ab265907c7809e3
Size: 43.62 MB - kernel-cross-headers-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: b3e005bae39317216e4b182d843ae9af
SHA-256: 5e9d3ea00e75845653d55638f828fb4dd0de9e8b3a90df06d580929466e13f69
Size: 15.92 MB - kernel-debug-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 20f03b05f087c4732ecd59fdd6961e59
SHA-256: 7f1bd16e105b5f03257138e27a3ae17588c4e8f41b7e588203c1574a6e73bb67
Size: 10.58 MB - kernel-debug-core-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 2c73d608f7483a27728cf4be3a723fe9
SHA-256: 0ea89275e67bf2b65d2695bdc9f4242f71b35952edfc7b5414b225723bfd4fb6
Size: 72.94 MB - kernel-debug-devel-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 0f4111ccc38bd9f5aabece6a6335d228
SHA-256: 9e2b7bb60aab3f4fa9f3be29aeefe49738bde2644549b92d07586928f62fed48
Size: 24.42 MB - kernel-debug-modules-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: c81634cda4583bd0c8525eb4e7515146
SHA-256: 3b2737a949802c0fd9aca5c2e8ba76164de1c8c56b443b32b4dd24dce87c6460
Size: 66.04 MB - kernel-debug-modules-extra-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: e20814900200deb85194697f780ab2a3
SHA-256: 22aa7e8fb8ef718c1cbe79148ddc90bae6d878508a15ec99c52769468b272b39
Size: 11.95 MB - kernel-devel-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 55d65f32e6d7bdb466a18d45b1edbd44
SHA-256: 5d2c30c27f78ab4732c88367cb9157443324d83025b86eb3f1b6f2711c84d3aa
Size: 24.22 MB - kernel-doc-4.18.0-553.123.1.el8_10.noarch.rpm
MD5: 38c4a409ead589cbab5ff2991c1267cd
SHA-256: f9e88c575008f84ac11d68d47b2e5afedf23f32612ba28ae65bb0c9ce938a512
Size: 28.45 MB - kernel-headers-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 0af0dfff55dc735eccf2dafcaf30348a
SHA-256: 33270bb10f5c846b82e3dfa2eb378e4fa6ee7cd5cc139712ce0ab4a71012f613
Size: 11.93 MB - kernel-modules-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 598c2fdf55c927b413aa8ac5732a241d
SHA-256: 91d49b4083467a14ea98eee44d7d6951338ae6e90c1a312094e2836c0f37128d
Size: 36.41 MB - kernel-modules-extra-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 0ddf8bd5f255ed7061a2d426ffedbf02
SHA-256: 60f4f9d68026ff9a212667108dc0793d1f3a9bac456fa626f88a583e1e627329
Size: 11.27 MB - kernel-tools-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 6c5d222935e0c8f26a3b574d5fc31b99
SHA-256: 385aa6e21c89ddc490767524de5e4fe30adf83f964907164e0e3e62b0df927f1
Size: 10.80 MB - kernel-tools-libs-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 3d117d063e5595add18d9143438a23bc
SHA-256: 17dce3914682a64d84a0e82122cd2531400779caee0c5d32df3e9c7735abab0a
Size: 10.59 MB - kernel-tools-libs-devel-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: 6ca01be1820c41a0ade7ee7e54de466f
SHA-256: 9beff0844c7f6a28cca904f6ec89a4b232e4163d08e91c9b15daf8715c73cedc
Size: 10.58 MB - perf-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: e07d1e3e6bdf08681c5bcf55d06e397d
SHA-256: 32bb539ef0ef47aa5bd4fc4934f6bd5db3217ec2ffcf07aec813a7585c0af83f
Size: 12.90 MB - python3-perf-4.18.0-553.123.1.el8_10.x86_64.rpm
MD5: f47dc92d8ad8c72edc85b2ad16de272c
SHA-256: e99beca0a0032df8d2f77e0316fc63c3a6b4b8cba117b79a84db5c199c4a59f7
Size: 10.70 MB