Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2026:0533 - Security Advisory
发布:
2026-01-14
已更新:
2026-01-14

RHSA-2026:0533 - Security Advisory

  • 概述
  • 更新的软件包

概述

Important: kernel security update

类型/严重性

Security Advisory: Important

Red Hat Lightspeed patch analysis

识别并修复受此公告影响的系统。

查看受影响的系统

标题

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051)
  • kernel: smb: client: fix race with concurrent opens in rename(2) (CVE-2025-39825)
  • kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
  • kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401)
  • kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)
  • kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)
  • kernel: nbd: fix incomplete validation of ioctl arg (CVE-2023-53513)
  • kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL (CVE-2023-53680)
  • kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses (CVE-2023-53675)
  • kernel: media: rc: fix races with imon_disconnect() (CVE-2025-39993)
  • kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (CVE-2023-53705)
  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

受影响的产品

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64

修复

  • BZ - 2373329 - CVE-2025-38051 kernel: smb: client: Fix use-after-free in cifs_fill_dirent
  • BZ - 2395792 - CVE-2025-39825 kernel: smb: client: fix race with concurrent opens in rename(2)
  • BZ - 2395805 - CVE-2025-39817 kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
  • BZ - 2396417 - CVE-2023-53401 kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
  • BZ - 2397553 - CVE-2025-39883 kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
  • BZ - 2400598 - CVE-2025-39898 kernel: e1000e: fix heap overflow in e1000_set_eeprom
  • BZ - 2400795 - CVE-2023-53513 kernel: nbd: fix incomplete validation of ioctl arg
  • BZ - 2402213 - CVE-2023-53680 kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
  • BZ - 2402293 - CVE-2023-53675 kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses
  • BZ - 2404121 - CVE-2025-39993 kernel: media: rc: fix races with imon_disconnect()
  • BZ - 2405713 - CVE-2023-53705 kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
  • BZ - 2422801 - CVE-2025-68285 kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()

CVE

  • CVE-2023-53401
  • CVE-2023-53513
  • CVE-2023-53675
  • CVE-2023-53680
  • CVE-2023-53705
  • CVE-2025-38051
  • CVE-2025-39817
  • CVE-2025-39825
  • CVE-2025-39883
  • CVE-2025-39898
  • CVE-2025-39993
  • CVE-2025-68285

参考

  • https://access.redhat.com/security/updates/classification/#important
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kernel-4.18.0-305.183.1.el8_4.src.rpm SHA-256: 05a91eceb8fac84d9435b1fa45058b86e9c866d0ba1926286ccc0cab1d27bb2e
x86_64
bpftool-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 2d459035e1d178f8150d878ac8cf3842b95d4ef5385b347ecf8a93a0a7cc9319
bpftool-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 416fa88910a579575604634d698fdf214922ef62d83e6d81149ce58a68b94a71
kernel-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 9798b968a46a7c5384d852212ff8ace9c566bc473f43d090deae91a329ede42d
kernel-abi-stablelists-4.18.0-305.183.1.el8_4.noarch.rpm SHA-256: c591104e99981d197efa56a3961ac5324ffff2f20ae864efe5c87690ffc1b0e0
kernel-core-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 925e5d8a59afe516d961e0be0e7b3e1255cc275f0306e91cf9fc755115586cd0
kernel-cross-headers-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 7030a0fcaee841929c3f05085bc4b8cd207a413f331e5c6fb633a7e01652df49
kernel-debug-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 4252766a68e57f68329a4eb92cdb71945decb4152b8e20b3bea48dbf383acd65
kernel-debug-core-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 9e9960a6aa03a249996255996e357480f21179943cf3eeea22ff31a73b7374bf
kernel-debug-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 2baf377fbd96f637bb7b1ff30115bfb3301dd04aa0f7c84647f25abe00dc30a6
kernel-debug-devel-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: f68d119d20fd4cf4f6bc510409faab0a20b99440579c4756cee0e2981d87280d
kernel-debug-modules-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 6623bc7b668858d117b9251db603c5afea02b376031db1e906e5461a3c9f9ad8
kernel-debug-modules-extra-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: a48f75406a3a49a18be46c41ced8667d71f165bc199b2a13dba3777cd845ffe9
kernel-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 9d36102942b3518b6fd2dbe7197b0d75380b68cbeef04e32a47c80178897c0fb
kernel-debuginfo-common-x86_64-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 665f289ff7e068e4625d5e491fadb6e3bbc0455a77305fef0732ed2be25a9414
kernel-devel-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 37d787d1dfb6bf2965ad1025a81f7a5e73bf72699035854b86460e20b94a1b0b
kernel-doc-4.18.0-305.183.1.el8_4.noarch.rpm SHA-256: 780b792641e096a530f413d66c09ac7c25baf1da25c6d21053a699219b319068
kernel-headers-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: b1e0b4ae070e3aa47309252867b70ab917e481c56f11f24a54c699e2270589a5
kernel-modules-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: ed0313af0817bbd488a62bdb23bc03a0aca4c5fd63d41d6f4cb44ead81f35319
kernel-modules-extra-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 41de154f841bffeb63d6a173ead122c5e73a74ec9899be03d9e8e52ec08c8a88
kernel-tools-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 385dc4397998e5feae0c43ec5df26a6c6f81892a73fe25f9c3374f7381c76b5a
kernel-tools-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 367a9fe52e260c658e4491cf9fb8d85b9f4e60d97a3c5b22bb81d3490efb6b89
kernel-tools-libs-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: a55a701ce25b1141bfcc6dc2b289ae79fe08e7875d827088e877cb147907458e
perf-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 357531416ef168f749d81e8dedb6ace45d548bb612b6040409b0c2e0ebbbe9fb
perf-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: f3ca340511d00d58e7720181fb95db15d613391bcaa9590a495d8695d5db3ae1
python3-perf-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: de07a178623831bef467e17ed8f0ffe4be0af6da7c425dea691e8a4eda90dfa4
python3-perf-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 39492adede94f290daa8a66c9a64b6b86f07617a40ce2993eca44155a2318add

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kernel-4.18.0-305.183.1.el8_4.src.rpm SHA-256: 05a91eceb8fac84d9435b1fa45058b86e9c866d0ba1926286ccc0cab1d27bb2e
x86_64
bpftool-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 2d459035e1d178f8150d878ac8cf3842b95d4ef5385b347ecf8a93a0a7cc9319
bpftool-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 416fa88910a579575604634d698fdf214922ef62d83e6d81149ce58a68b94a71
kernel-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 9798b968a46a7c5384d852212ff8ace9c566bc473f43d090deae91a329ede42d
kernel-abi-stablelists-4.18.0-305.183.1.el8_4.noarch.rpm SHA-256: c591104e99981d197efa56a3961ac5324ffff2f20ae864efe5c87690ffc1b0e0
kernel-core-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 925e5d8a59afe516d961e0be0e7b3e1255cc275f0306e91cf9fc755115586cd0
kernel-cross-headers-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 7030a0fcaee841929c3f05085bc4b8cd207a413f331e5c6fb633a7e01652df49
kernel-debug-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 4252766a68e57f68329a4eb92cdb71945decb4152b8e20b3bea48dbf383acd65
kernel-debug-core-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 9e9960a6aa03a249996255996e357480f21179943cf3eeea22ff31a73b7374bf
kernel-debug-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 2baf377fbd96f637bb7b1ff30115bfb3301dd04aa0f7c84647f25abe00dc30a6
kernel-debug-devel-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: f68d119d20fd4cf4f6bc510409faab0a20b99440579c4756cee0e2981d87280d
kernel-debug-modules-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 6623bc7b668858d117b9251db603c5afea02b376031db1e906e5461a3c9f9ad8
kernel-debug-modules-extra-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: a48f75406a3a49a18be46c41ced8667d71f165bc199b2a13dba3777cd845ffe9
kernel-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 9d36102942b3518b6fd2dbe7197b0d75380b68cbeef04e32a47c80178897c0fb
kernel-debuginfo-common-x86_64-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 665f289ff7e068e4625d5e491fadb6e3bbc0455a77305fef0732ed2be25a9414
kernel-devel-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 37d787d1dfb6bf2965ad1025a81f7a5e73bf72699035854b86460e20b94a1b0b
kernel-doc-4.18.0-305.183.1.el8_4.noarch.rpm SHA-256: 780b792641e096a530f413d66c09ac7c25baf1da25c6d21053a699219b319068
kernel-headers-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: b1e0b4ae070e3aa47309252867b70ab917e481c56f11f24a54c699e2270589a5
kernel-modules-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: ed0313af0817bbd488a62bdb23bc03a0aca4c5fd63d41d6f4cb44ead81f35319
kernel-modules-extra-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 41de154f841bffeb63d6a173ead122c5e73a74ec9899be03d9e8e52ec08c8a88
kernel-tools-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 385dc4397998e5feae0c43ec5df26a6c6f81892a73fe25f9c3374f7381c76b5a
kernel-tools-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 367a9fe52e260c658e4491cf9fb8d85b9f4e60d97a3c5b22bb81d3490efb6b89
kernel-tools-libs-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: a55a701ce25b1141bfcc6dc2b289ae79fe08e7875d827088e877cb147907458e
perf-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 357531416ef168f749d81e8dedb6ace45d548bb612b6040409b0c2e0ebbbe9fb
perf-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: f3ca340511d00d58e7720181fb95db15d613391bcaa9590a495d8695d5db3ae1
python3-perf-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: de07a178623831bef467e17ed8f0ffe4be0af6da7c425dea691e8a4eda90dfa4
python3-perf-debuginfo-4.18.0-305.183.1.el8_4.x86_64.rpm SHA-256: 39492adede94f290daa8a66c9a64b6b86f07617a40ce2993eca44155a2318add

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility