kernel-4.18.0-553.124.4.el8_10
エラータID: AXSA:2026-707:36
Release date:
Friday, May 22, 2026 - 09:41
Subject:
kernel-4.18.0-553.124.4.el8_10
Affected Channels:
Asianux Server 8 for x86_64
Severity:
High
Description:
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
Security Fix(es):
* kernel: net: skbuff: propagate shared-frag marker through frag-transfer
helpers (CVE-2026-46300)
* kernel: ptrace: require CAP_SYS_PTRACE when task has no mm (CVE-2026-46333)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE(s):
CVE-2026-46300
CVE-2026-46333
Solution:
Update packages.
CVEs:
CVE-2026-46333
In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.
In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.
Additional Info:
N/A
Download:
SRPMS
- kernel-4.18.0-553.124.4.el8_10.src.rpm
MD5: ac2e58a776c4901d581396c06ad5c542
SHA-256: 65c36f4cd8c66eccf57d95c8e242f3c464eb78ff706d93fff19fa3d65cab6ed5
Size: 132.38 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 564f5a8438ad16ccd64162c707d33aac
SHA-256: 366986983eb53a274c2cda5aaa9a1a588484ab2f2aabce59f998c7448bd836bb
Size: 11.30 MB - kernel-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 61c8d29fbdad1b3222f1429a2f2898d1
SHA-256: 8ae2e1baabace38567de88997baecdae60b82efcd93c2246fa9614bec83c8400
Size: 10.58 MB - kernel-abi-stablelists-4.18.0-553.124.4.el8_10.noarch.rpm
MD5: 79229f8efad145bfc615ca12560ab515
SHA-256: 61a0541efbc09e7b5f2a9653677061dbe889354b57d644202f69ae818de17246
Size: 10.59 MB - kernel-core-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: b23e0fcb386972b1aa3b3b601dc3a7ec
SHA-256: 611ac57938b2631eb16805d34df9994b8eb69a7f0ac4d38391aba8fb13f14ed6
Size: 43.61 MB - kernel-cross-headers-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 080824a64cd39618453b15aae9aa7c57
SHA-256: d34bf9166b0a0ac43ac7ddd7e9a1df6bb9dabc3a998b4c91b9a75ef76583caa1
Size: 15.92 MB - kernel-debug-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 56af9bb9dde251881239a1f782a0593b
SHA-256: 132ab771829f622908ca9180f3218367d45496cb670e2f25fd294a204030173c
Size: 10.58 MB - kernel-debug-core-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: dc9977397f91f1f5f5f762726eb40e36
SHA-256: 0522ff27534d49a0f87856915f6115a11a94be2f4814275aee9e15119732d72d
Size: 72.92 MB - kernel-debug-devel-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: d5ea29da13341eca5bd18b912b94098d
SHA-256: 5bd3944534f7e9c95ad294d0d16a19f4342eb74e95923c660ba63acfe70dc157
Size: 24.43 MB - kernel-debug-modules-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: edd66d230b723b281b90e4c064ff9e08
SHA-256: cd4cc9b831622463b467a2a8c253e4f545b1cc08ade46799f5b3dbbfc7649014
Size: 66.04 MB - kernel-debug-modules-extra-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 788efe54913939f6632836a03ad5aed7
SHA-256: 5b1c1d301672a53c0e4cbe41e9a1c689bffce88f52972eb82704a029895528fe
Size: 11.96 MB - kernel-devel-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 9091415bb8db7d1a1b080c4133040e6a
SHA-256: fa9fad7bb6b1464c1035f47b91b1951ee6b31162bbdc6ae3bf516a56a1657b97
Size: 24.22 MB - kernel-doc-4.18.0-553.124.4.el8_10.noarch.rpm
MD5: 76343076ad82c8cc24643a935cd4596f
SHA-256: 1f2801acd78cce4c0cf9a82e4625e0b9464541785f3701e7e839eba034964fca
Size: 28.45 MB - kernel-headers-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 64cad26fa3be3a14e423de8f55fa90a7
SHA-256: 3108ace31e1b6ae41f8f35ac4379458185d817c0cca1619fb2892ebd2410def1
Size: 11.93 MB - kernel-modules-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 2538782065abdf8a72cd7fde6565187d
SHA-256: 56b6ec7be0674d91b62655fc9c662a186a047936e952beb4d45736e7bbee8b58
Size: 36.41 MB - kernel-modules-extra-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 02dd9e46e6204c5eb0e2ec2ddcf1ba18
SHA-256: 7c969282b424d11784e90c1becabb833e4012a4934a5ac109b38d3ccc686fd22
Size: 11.27 MB - kernel-tools-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 986869474871f8a2a9edc806b39c0153
SHA-256: d361b8a17352a8e5e8aca4907203572c3ebd528b28c631b083607dd60743adc7
Size: 10.80 MB - kernel-tools-libs-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: e4ce1c4e7329aeabb71cf48c5e985ad1
SHA-256: 3c4fd2036534129450c54e1ad4b3b9e605c3779aa656254bfff2b53fea010dbc
Size: 10.59 MB - kernel-tools-libs-devel-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 47b5aaf04a7b2081993c402414fa0acf
SHA-256: 28987dbca6d7a8f91756df9ca04e74f4e0375cdecfec59ad894f1829b4929ba8
Size: 10.58 MB - perf-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: c100f1c6f25f21a2d955ce4d739f9e4e
SHA-256: 4572cef9e23d5990ce3a7a69acf687c530594c44fcfd7a32bc11888e9a505745
Size: 12.90 MB - python3-perf-4.18.0-553.124.4.el8_10.x86_64.rpm
MD5: 56690f511ff749843f8a50907ffcd26c
SHA-256: b59026de11e09145e34f9b8063c8abc8ee1861dddedf4b82b6ad59e8492cc967
Size: 10.70 MB