kernel-4.18.0-553.44.1.el8_10
エラータID: AXSA:2025-9768:19
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: zero-initialize the report buffer (CVE-2024-50302)
* kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (CVE-2024-53197)
* kernel: scsi: megaraid_sas: Fix for a potential deadlock (CVE-2024-57807)
* kernel: pps: Fix a use-after-free (CVE-2024-57979)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-50302
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
CVE-2024-53197
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
CVE-2024-57807
In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.
CVE-2024-57979
In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20 x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: kobject_put+0x120/0x150 cdev_put+0x20/0x3c __fput+0x2c4/0x2d8 ____fput+0x1c/0x38 task_work_run+0x70/0xfc do_exit+0x2a0/0x924 do_group_exit+0x34/0x90 get_signal+0x7fc/0x8c0 do_signal+0x128/0x13b4 do_notify_resume+0xdc/0x160 el0_svc+0xd4/0xf8 el0t_64_sync_handler+0x140/0x14c el0t_64_sync+0x190/0x194 ---[ end trace 0000000000000000 ]--- ...followed by more symptoms of corruption, with similar stacks: refcount_t: underflow; use-after-free. kernel BUG at lib/list_debug.c:62! Kernel panic - not syncing: Oops - BUG: Fatal exception This happens because pps_device_destruct() frees the pps_device with the embedded cdev immediately after calling cdev_del(), but, as the comment above cdev_del() notes, fops for previously opened cdevs are still callable even after cdev_del() returns. I think this bug has always been there: I can't explain why it suddenly started happening every time I reboot this particular board. In commit d953e0e837e6 ("pps: Fix a use-after free bug when unregistering a source."), George Spelvin suggested removing the embedded cdev. That seems like the simplest way to fix this, so I've implemented his suggestion, using __register_chrdev() with pps_idr becoming the source of truth for which minor corresponds to which device. But now that pps_idr defines userspace visibility instead of cdev_add(), we need to be sure the pps->dev refcount can't reach zero while userspace can still find it again. So, the idr_remove() call moves to pps_unregister_cdev(), and pps_idr now holds a reference to pps->dev. pps_core: source serial1 got cdev (251:1) <...> pps pps1: removed pps_core: unregistering pps1 pps_core: deallocating pps1
Update packages.
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.
In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20 x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: kobject_put+0x120/0x150 cdev_put+0x20/0x3c __fput+0x2c4/0x2d8 ____fput+0x1c/0x38 task_work_run+0x70/0xfc do_exit+0x2a0/0x924 do_group_exit+0x34/0x90 get_signal+0x7fc/0x8c0 do_signal+0x128/0x13b4 do_notify_resume+0xdc/0x160 el0_svc+0xd4/0xf8 el0t_64_sync_handler+0x140/0x14c el0t_64_sync+0x190/0x194 ---[ end trace 0000000000000000 ]--- ...followed by more symptoms of corruption, with similar stacks: refcount_t: underflow; use-after-free. kernel BUG at lib/list_debug.c:62! Kernel panic - not syncing: Oops - BUG: Fatal exception This happens because pps_device_destruct() frees the pps_device with the embedded cdev immediately after calling cdev_del(), but, as the comment above cdev_del() notes, fops for previously opened cdevs are still callable even after cdev_del() returns. I think this bug has always been there: I can't explain why it suddenly started happening every time I reboot this particular board. In commit d953e0e837e6 ("pps: Fix a use-after free bug when unregistering a source."), George Spelvin suggested removing the embedded cdev. That seems like the simplest way to fix this, so I've implemented his suggestion, using __register_chrdev() with pps_idr becoming the source of truth for which minor corresponds to which device. But now that pps_idr defines userspace visibility instead of cdev_add(), we need to be sure the pps->dev refcount can't reach zero while userspace can still find it again. So, the idr_remove() call moves to pps_unregister_cdev(), and pps_idr now holds a reference to pps->dev. pps_core: source serial1 got cdev (251:1) <...> pps pps1: removed pps_core: unregistering pps1 pps_core: deallocating pps1
N/A
SRPMS
- kernel-4.18.0-553.44.1.el8_10.src.rpm
MD5: 69ffb7a5131b4058ef843bf2eb99d9d6
SHA-256: 312e6af8a2dac846a78db6d6d85c0d31a61c87a1c5c0257f5c99efc66b2132ba
Size: 132.21 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 8c2b8d66accb05d0445f54f2a74d7a35
SHA-256: a479746253028a6f5d8e70e51aac54a70c845541bd500f28445d8507b5938176
Size: 11.20 MB - kernel-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 43fbd837cb37b19175d284fce385f7e0
SHA-256: ca92beaafcc9c14e275185516c2dc92e531502796ac52fe19873ff88d1c5e116
Size: 10.48 MB - kernel-abi-stablelists-4.18.0-553.44.1.el8_10.noarch.rpm
MD5: fe06dc0cbc80adaa43693227acf1e51b
SHA-256: 85adda2435d3b48c7eb3bc3bea7e8761259e72ec0af08824f1e38eae0f1d70e1
Size: 10.49 MB - kernel-core-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 0b915ecb2ea3068b40d527660ed3c81b
SHA-256: 104641eb1a95dc06eee85cebe16ef35d65944a3d1215c3fcbc0a5d596ea4fbc6
Size: 43.50 MB - kernel-cross-headers-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: f3c4ae3e00e1b33b906baf6a45bb1e40
SHA-256: ffafb69bd246caa04771086036c46cc49f29bc893f1d0ee8826ba69a82915f42
Size: 15.82 MB - kernel-debug-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: c92d8d2d14d5bb4db984889f74d42645
SHA-256: 3efd64f74c37bd3ad8b905c87311cf0a033729ee7088edfc0235dc761ef8ca17
Size: 10.48 MB - kernel-debug-core-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: c9710cb7803c232ca87ad12f88aaefb5
SHA-256: 7c4f1221b70fb3fdbea74cb85eaf4f2712ac0ddd4ee83bb478da3fab1d640996
Size: 72.80 MB - kernel-debug-devel-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 5e0f4847286ebdfbbba8998f73829903
SHA-256: 64daad9401b2cbe662b7523b40bf13652576ef451405d2b4bcff4451675fafb3
Size: 24.30 MB - kernel-debug-modules-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: dc4875e713f042e766045d081c3e0904
SHA-256: 4ca741cdd9f1f552054c183bc97a5040fa37a6ccf65c7e76c27aaf0eba7c1b9e
Size: 65.90 MB - kernel-debug-modules-extra-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 9df9795d3252e0a3b446720a428b728b
SHA-256: 0def053f8a331a337d34ed8d3227dd9e430d392558bdb47e0913db6dddb58f9e
Size: 11.85 MB - kernel-devel-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 881314606dce0de1618e78c4021a4789
SHA-256: 6f90c2a77be22d79d872ef706a882326091233d80455ac274639207dbf166ed9
Size: 24.10 MB - kernel-doc-4.18.0-553.44.1.el8_10.noarch.rpm
MD5: 2745d703b70eee1b775133019eca8235
SHA-256: e36eb08d71b64644d91ca3ac73ec3292df52b62228f92133c094642b1d242421
Size: 28.34 MB - kernel-headers-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: d875118f8cc24819f513a6498dec2e3b
SHA-256: da4655f1d21d0e6cd55f596754e0800a7ce6deb89a5f54b8fd718dece7283614
Size: 11.83 MB - kernel-modules-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: a1b47e562606e8f5e021007e365b874c
SHA-256: e55ea272aca5bbc9f21ae8720915563ccc105a19a5b869c31aa46f01f4c69a96
Size: 36.30 MB - kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 04162da5a733d9a8d87dbada37330b86
SHA-256: 64602e35b3c693728a2a8eefa28914e8122d63ce7b9ee7ba16ddb559e408b34e
Size: 11.17 MB - kernel-tools-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: de673560ad8c7bf3f6fa59404f29a9ed
SHA-256: b1674a225751eba98dfda5f0c611f4f8e9f65112106ce9302195bcd6e24581d2
Size: 10.70 MB - kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 963fad9a44bfa00d90e726590e00ee1f
SHA-256: 595349c51a2feef6a8892a64dad719bebde1762f0ac9bbee2aeba7db1897b598
Size: 10.49 MB - kernel-tools-libs-devel-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 4b741c09a3e4eb9cd59b7823dea6798d
SHA-256: 751dd3af366f6ab0f319e72614cedd3d5e8fa07df15fecce4fedc0f49be48a26
Size: 10.48 MB - perf-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: b9cbaa2bbea43f301862b7937682cdc5
SHA-256: 03a21053f524ade54e0be19d2e785a5fe03bae33da0a298d8cf428317d2b2d85
Size: 12.80 MB - python3-perf-4.18.0-553.44.1.el8_10.x86_64.rpm
MD5: 4670099fc3b03a8e7ce55bcfd8beb1fd
SHA-256: 8d11112640c52ed78d481afb84c6ae1bd18ddc386bb8ec2f325bc0648128e9a5
Size: 10.60 MB