Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2026:3360 - Security Advisory
发布:
2026-02-25
已更新:
2026-02-25

RHSA-2026:3360 - Security Advisory

  • 概述
  • 更新的软件包

概述

Important: kernel security update

类型/严重性

Security Advisory: Important

Red Hat Lightspeed patch analysis

识别并修复受此公告影响的系统。

查看受影响的系统

标题

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022)
  • kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415)
  • kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion (CVE-2025-38459)
  • kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760)
  • kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)
  • kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)
  • kernel: net/mlx5e: Check for NOT_READY flag state after locking (CVE-2023-53581)
  • kernel: Bluetooth: hci_event: call disconnect callback before deleting conn (CVE-2023-53673)
  • kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271)
  • kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service. (CVE-2025-40304)
  • kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322)
  • kernel: ip6_vti: fix slab-use-after-free in decode_session6 (CVE-2023-53821)
  • kernel: ext4: fix use-after-free in ext4_orphan_cleanup (CVE-2022-50673)
  • kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state (CVE-2023-53833)
  • kernel: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (CVE-2023-53827)
  • kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (CVE-2025-68349)
  • kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() (CVE-2022-50865)
  • kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation (CVE-2026-23074)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

受影响的产品

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64

修复

  • BZ - 2373326 - CVE-2025-38022 kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
  • BZ - 2383404 - CVE-2025-38415 kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation
  • BZ - 2383487 - CVE-2025-38459 kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion
  • BZ - 2394601 - CVE-2025-39760 kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing
  • BZ - 2401432 - CVE-2025-39933 kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
  • BZ - 2401510 - CVE-2023-53539 kernel: RDMA/rxe: Fix incomplete state save in rxe_requester
  • BZ - 2401545 - CVE-2023-53581 kernel: net/mlx5e: Check for NOT_READY flag state after locking
  • BZ - 2402193 - CVE-2023-53673 kernel: Bluetooth: hci_event: call disconnect callback before deleting conn
  • BZ - 2419837 - CVE-2025-40271 kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.
  • BZ - 2419870 - CVE-2025-40304 kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
  • BZ - 2419902 - CVE-2025-40322 kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
  • BZ - 2420329 - CVE-2023-53821 kernel: ip6_vti: fix slab-use-after-free in decode_session6
  • BZ - 2420347 - CVE-2022-50673 kernel: ext4: fix use-after-free in ext4_orphan_cleanup
  • BZ - 2420366 - CVE-2023-53833 kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state
  • BZ - 2420376 - CVE-2023-53827 kernel: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}
  • BZ - 2424880 - CVE-2025-68349 kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
  • BZ - 2426226 - CVE-2022-50865 kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
  • BZ - 2436791 - CVE-2026-23074 kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation

CVE

  • CVE-2022-50673
  • CVE-2022-50865
  • CVE-2023-53539
  • CVE-2023-53581
  • CVE-2023-53673
  • CVE-2023-53821
  • CVE-2023-53827
  • CVE-2023-53833
  • CVE-2025-38022
  • CVE-2025-38415
  • CVE-2025-38459
  • CVE-2025-39760
  • CVE-2025-39933
  • CVE-2025-40271
  • CVE-2025-40304
  • CVE-2025-40322
  • CVE-2025-68349
  • CVE-2026-23074

参考

  • https://access.redhat.com/security/updates/classification/#important
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kernel-4.18.0-305.186.1.el8_4.src.rpm SHA-256: caeada906ea81dfcade78bda455107e115149926978675dbcbfda5a42428846d
x86_64
bpftool-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 4482a1627ea5efb9920282b801102f5d68e9d25c87dc55ea447801643320f29b
bpftool-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 85b34f22b2ed4654e62dd41a552bf6da7dd13a002d12ebc30df6bd2adfd224a1
kernel-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b80cf4f527393895d1923492733f347d91974d8b3d3fd6d03ee91e2351e8c7cd
kernel-abi-stablelists-4.18.0-305.186.1.el8_4.noarch.rpm SHA-256: f5daaee801fd1326a4afd1f8142946acc6ac0bc50bd809a0fa1314ae6ad3c1b6
kernel-core-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b0d0e468607f5c53c6f9ca23033a4db3485c627d4326a6879a3792f7a657e431
kernel-cross-headers-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 57a4422b43d8b922fa4329adb86fbb7a4f7422e6139556971a085bc65761ac99
kernel-debug-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 1a922bacbb7e72da7826fddd2255aaf616dc396ac98042901890c05e226da1d6
kernel-debug-core-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 776ad9cff98dfdca6a2d83e9238e87dd2e893609391fb77c7649fd840ea2a243
kernel-debug-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 9eff8e7e7cd60b15fe3750c1563071cd1b162a72a656bef660fea5e9c1bc5117
kernel-debug-devel-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b271a3bc3f0d20c1a18b45d408633bb0161bac0d8cc26ee3f62de7942270357b
kernel-debug-modules-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 5e744a44271fe5e68fd13ce2aa9f9bd38115420ba444e17886605b741ed50a5b
kernel-debug-modules-extra-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 3f703155dc86f5a850b8a6124edee4fb82f3ef9e9f7ec14a86a00668cb5be201
kernel-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 63c1df23312afb0ff17eb8b160bbb9e851f43bc309fbcd971724f8bd273225e9
kernel-debuginfo-common-x86_64-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 9406317aa46bf332cbb644289a6348df4de5f74f6797715e3697eedfecff5532
kernel-devel-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 931ea626270ab7b17c7adc1913def636c628da8e9f46483db152e4bdf9f5ea3f
kernel-doc-4.18.0-305.186.1.el8_4.noarch.rpm SHA-256: 6b148bdae11c52a0889664042a80d9666e98b1446e876fb7a8689b348caf7dfb
kernel-headers-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: db91bc33ae4f02d96230e37e10ef876ac2a3b943fcaab5a1b908bb5ce4bc321b
kernel-modules-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 98b499ff748ae8bb6f5dd1afcba3883e207c8878074a3badb550633f8f229f50
kernel-modules-extra-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 48808a8fca78604afb13bbd0d0d8a54ecbb362d005d46e35cb3a4151abffc837
kernel-tools-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 646ba2f52ee849cedcabe56c3280d68b944e68760e07a4497581d0d746cef89d
kernel-tools-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 869a2d95085a859f298361bb27c00dda36eb2cfce9c90e54578a73913e06a0b6
kernel-tools-libs-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 8de4e888dc087b5611882fe23a69565b7c158069f97667bd6f96128de5b5d04b
perf-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 2101d98a9c2a4fee3ac0fe059a7048272fa10b6dd9d7ed11abeac13e412ab905
perf-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 102f1d50cde529648486884270cc08b51e8e45f8689d47fbe074d26abf445197
python3-perf-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b0c582897b33ef98c54ed884c177a80efc9ba0607d4cd69f0bb51abfbd7f6ce2
python3-perf-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: ab5f03b4295f9aa9c8dd9e79bd14d28182a6e4f5525f7e2560e077fcfe9e5436

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kernel-4.18.0-305.186.1.el8_4.src.rpm SHA-256: caeada906ea81dfcade78bda455107e115149926978675dbcbfda5a42428846d
x86_64
bpftool-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 4482a1627ea5efb9920282b801102f5d68e9d25c87dc55ea447801643320f29b
bpftool-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 85b34f22b2ed4654e62dd41a552bf6da7dd13a002d12ebc30df6bd2adfd224a1
kernel-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b80cf4f527393895d1923492733f347d91974d8b3d3fd6d03ee91e2351e8c7cd
kernel-abi-stablelists-4.18.0-305.186.1.el8_4.noarch.rpm SHA-256: f5daaee801fd1326a4afd1f8142946acc6ac0bc50bd809a0fa1314ae6ad3c1b6
kernel-core-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b0d0e468607f5c53c6f9ca23033a4db3485c627d4326a6879a3792f7a657e431
kernel-cross-headers-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 57a4422b43d8b922fa4329adb86fbb7a4f7422e6139556971a085bc65761ac99
kernel-debug-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 1a922bacbb7e72da7826fddd2255aaf616dc396ac98042901890c05e226da1d6
kernel-debug-core-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 776ad9cff98dfdca6a2d83e9238e87dd2e893609391fb77c7649fd840ea2a243
kernel-debug-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 9eff8e7e7cd60b15fe3750c1563071cd1b162a72a656bef660fea5e9c1bc5117
kernel-debug-devel-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b271a3bc3f0d20c1a18b45d408633bb0161bac0d8cc26ee3f62de7942270357b
kernel-debug-modules-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 5e744a44271fe5e68fd13ce2aa9f9bd38115420ba444e17886605b741ed50a5b
kernel-debug-modules-extra-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 3f703155dc86f5a850b8a6124edee4fb82f3ef9e9f7ec14a86a00668cb5be201
kernel-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 63c1df23312afb0ff17eb8b160bbb9e851f43bc309fbcd971724f8bd273225e9
kernel-debuginfo-common-x86_64-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 9406317aa46bf332cbb644289a6348df4de5f74f6797715e3697eedfecff5532
kernel-devel-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 931ea626270ab7b17c7adc1913def636c628da8e9f46483db152e4bdf9f5ea3f
kernel-doc-4.18.0-305.186.1.el8_4.noarch.rpm SHA-256: 6b148bdae11c52a0889664042a80d9666e98b1446e876fb7a8689b348caf7dfb
kernel-headers-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: db91bc33ae4f02d96230e37e10ef876ac2a3b943fcaab5a1b908bb5ce4bc321b
kernel-modules-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 98b499ff748ae8bb6f5dd1afcba3883e207c8878074a3badb550633f8f229f50
kernel-modules-extra-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 48808a8fca78604afb13bbd0d0d8a54ecbb362d005d46e35cb3a4151abffc837
kernel-tools-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 646ba2f52ee849cedcabe56c3280d68b944e68760e07a4497581d0d746cef89d
kernel-tools-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 869a2d95085a859f298361bb27c00dda36eb2cfce9c90e54578a73913e06a0b6
kernel-tools-libs-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 8de4e888dc087b5611882fe23a69565b7c158069f97667bd6f96128de5b5d04b
perf-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 2101d98a9c2a4fee3ac0fe059a7048272fa10b6dd9d7ed11abeac13e412ab905
perf-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: 102f1d50cde529648486884270cc08b51e8e45f8689d47fbe074d26abf445197
python3-perf-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: b0c582897b33ef98c54ed884c177a80efc9ba0607d4cd69f0bb51abfbd7f6ce2
python3-perf-debuginfo-4.18.0-305.186.1.el8_4.x86_64.rpm SHA-256: ab5f03b4295f9aa9c8dd9e79bd14d28182a6e4f5525f7e2560e077fcfe9e5436

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility