Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-20128

kernel update [RHEL 8.10 4.18.0-553.117.1.el8_10]

    XMLWordPrintable

Details

    • Task
    • Resolution: Fixed
    • Medium
    • Lustre 2.18.0
    • Lustre 2.18.0, Lustre 2.15.9
    • None
    • 3
    • 9223372036854775807

    Description

      Security Fix(es) for kernel 4.18.0-553.115.1.el8_10:

      • kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)
      • kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)
      • kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)

      https://access.redhat.com/errata/product/479/ver=/rhel---8/x86_64/RHSA-2026:6037

      Security Fix(es) for kernel 4.18.0-553.117.1.el8_10:

      • kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)
      • kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)
      • kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)
      • kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. (CVE-2025-71238)

      https://access.redhat.com/errata/product/479/ver=/rhel---8/x86_64/RHSA-2026:6571

       

      Attachments

        Issue Links

          Activity

            People

              yujian Jian Yu
              yujian Jian Yu
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: