kernel-4.18.0-553.52.1.el8_10
エラータID: AXSA:2025-9961:32
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (CVE-2022-49011)
* kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt (CVE-2024-53141)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-49011
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak.
CVE-2024-53141
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak.
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.
N/A
SRPMS
- kernel-4.18.0-553.52.1.el8_10.src.rpm
MD5: ef142ba55b4cb84d060abf696e0faffb
SHA-256: 9287686acde793725ac931a948637d5be4cb6ba137d8f15c1ad8519773034a4d
Size: 132.22 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 7fcde5141c952568d0a3038fb9a570cb
SHA-256: e48d530f29a6fb279cdac24966f9b27c9200f5890034447ca24a6d236b215b6c
Size: 11.21 MB - kernel-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 1259f528b43e715f831b96364655daf1
SHA-256: 92f7b1be3e6b66f9a4e5c64d5c1f5bc5b4a49b7bcc8a2b65d0303f362802dd15
Size: 10.48 MB - kernel-abi-stablelists-4.18.0-553.52.1.el8_10.noarch.rpm
MD5: 35c2bae36bfcec503d9df9231724ab67
SHA-256: 3377ea300e6ffc84e8888afb70f437f020bcc5a372f6526369303fd5b5bc4f14
Size: 10.50 MB - kernel-core-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 1aae97cbd2f7e00dbff8a0903d99b5a0
SHA-256: 4fc9e5bde5db73d57d8679de8026de8ddb839178d1fd1ce33f9e4f59e85b9193
Size: 43.51 MB - kernel-cross-headers-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 15e6aacd87e8ef7fadb43da521af97c8
SHA-256: d4b06b4971699cac7773396a0f9693b80c99c6d97e6c864414139d7a4ddf85e3
Size: 15.83 MB - kernel-debug-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 352caccf00db5456762ddc86ce4a25b7
SHA-256: 7dadd1820415f5eae1ce927a3875dd32175fa3f8004d1fff3623a19725e5d60f
Size: 10.48 MB - kernel-debug-core-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 8af1c127f70c97b8c79b868c5b82991b
SHA-256: 5a668177aee1d195b6dbcbf37f21bc16038d0c0407b42df83639f13d9f99a4be
Size: 72.81 MB - kernel-debug-devel-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 2cc17a4939377528990e347896ae0752
SHA-256: d37b41dfa6bd275136e0b5d5cd819297461d622c5ddb0174f7279af177525424
Size: 24.31 MB - kernel-debug-modules-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: ca9ce520c5edccca654d08038023a9c4
SHA-256: 7c4512ddbd2df94e5f3f8246b0af51506294d7da7b69feb60e08a68f3130cba0
Size: 65.90 MB - kernel-debug-modules-extra-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: dc0a4cd72fd737be8fbaf7a2d6d0586a
SHA-256: 36bb442dce9d28e6fd2025020358db462b0611418f4cf68a4fdb556be5d874c3
Size: 11.86 MB - kernel-devel-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: f4e00db52937d676174f3c9a9dbc117c
SHA-256: 98cf54aca07055de0b99ce41ab464bc68294b5c7b6bd49beb9e8dab41313f3ad
Size: 24.11 MB - kernel-doc-4.18.0-553.52.1.el8_10.noarch.rpm
MD5: 104ef0b1d96ffdcef754489d84b78db5
SHA-256: 0c787ceb8af7d0fd434197b2f10d97fb6587e11f4aeb518d2bc14aba8bc47627
Size: 28.34 MB - kernel-headers-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 027a90b84fd8049c9fa4ca97b066b388
SHA-256: ef25879dff2daa04501001465699deddc6e652534d1233b9269181f8d9182dcc
Size: 11.84 MB - kernel-modules-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 7a4d1521ca2aa10d7c50f1b2b9b32eef
SHA-256: 1707e7d151b67a945ce69b4cc558393859255cff1200cbb3b0efcc7596805ebd
Size: 36.30 MB - kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 3d220719003ec7e5bfe6d36e81795fc9
SHA-256: b3eff2a1b714e2d99a44c4cb65b218c3a0e83380bf305f1583852cf681fbb891
Size: 11.17 MB - kernel-tools-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 17fa2d924bdb8ca07f428680a540d200
SHA-256: f5170b243440ecd365989969e9646c54a4c451234b03d6d3c7e39b478f101de5
Size: 10.70 MB - kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: a6d0cc48b6e8b33723f956ac62cc37d5
SHA-256: 796fa8c6d342a9c1d95c6cac4b71535d56182849abc6f34d434474c470b66427
Size: 10.49 MB - kernel-tools-libs-devel-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: c4b5cef74b568a87d2a0c30cace75a6d
SHA-256: f92174c40cc82264e4d8e45514a9c3d753d48cb6670cbecfd9b1f0d9e5fe1b3f
Size: 10.49 MB - perf-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 4d8b4e22ea78a2c034bc846d22b64313
SHA-256: fcc8930869b57ac5ee9eba2fab90e91c274f570a36d042adb2ab229e9fa41cf6
Size: 12.80 MB - python3-perf-4.18.0-553.52.1.el8_10.x86_64.rpm
MD5: 9f4f816ed316d326aac957135e66dedb
SHA-256: 5b8f50653d72c4692599f0e44ead7537e90c67bd1fa71013611fb173317586d1
Size: 10.61 MB