kernel-4.18.0-553.79.1.el8_10
エラータID: AXSA:2025-10982:79
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 (CVE-2022-50228)
* kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-50228
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 Don't BUG/WARN on interrupt injection due to GIF being cleared, since it's trivial for userspace to force the situation via KVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct for KVM internally generated injections). kernel BUG at arch/x86/kvm/svm/svm.c:3386! invalid opcode: 0000 [#1] SMP CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd] Code: <0f> 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53 RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006 RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0 RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000 FS: 0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0 Call Trace: inject_pending_event+0x2f7/0x4c0 [kvm] kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm] kvm_vcpu_ioctl+0x26d/0x650 [kvm] __x64_sys_ioctl+0x82/0xb0 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae
CVE-2023-53305
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free Fix potential use-after-free in l2cap_le_command_rej.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 Don't BUG/WARN on interrupt injection due to GIF being cleared, since it's trivial for userspace to force the situation via KVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct for KVM internally generated injections). kernel BUG at arch/x86/kvm/svm/svm.c:3386! invalid opcode: 0000 [#1] SMP CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd] Code: <0f> 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53 RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006 RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0 RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000 FS: 0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free Fix potential use-after-free in l2cap_le_command_rej.
N/A
SRPMS
- kernel-4.18.0-553.79.1.el8_10.src.rpm
MD5: 94ddbcae05ab277799825b9802c01893
SHA-256: 11b67f0c1120db8d5cf627942ad26db2e54bdc6fb912eeeb51b70bf6b05a6946
Size: 132.27 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 22c53c4dbc38eadd96c2fd96694b655f
SHA-256: a73d2554eb60aaeb97821040a578383300ca0bb4ecd6cc4ce310af33cf949a90
Size: 11.24 MB - kernel-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: aa36b92c59cd369dee62ba250d26e46b
SHA-256: f17ebb3ee89a481b3a5a3669d7c3a9c6519463a0848e0c83aba3c02bb4baefe8
Size: 10.51 MB - kernel-abi-stablelists-4.18.0-553.79.1.el8_10.noarch.rpm
MD5: 8825858d8e7cfe43ea742e0f941b6412
SHA-256: 890afed7fc2c83f2d1ed7523d165710c0012dd4de93477cb9ad657b424183f1c
Size: 10.53 MB - kernel-core-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 823b8e514a8434c52a85816382109c8f
SHA-256: 94b1bc28332f17ba3c6e1b4f1568f8c7c6f34b642ef14f14a0d812c18d69b713
Size: 43.54 MB - kernel-cross-headers-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 546923df35d0bc0e344366e372776591
SHA-256: e6fa9407ef582d8920d82b6f64cfd4361f697cd4e96c05459225dae3a496fe43
Size: 15.86 MB - kernel-debug-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 9a94883fc5cf79d3e256890cd369529f
SHA-256: 1a5c24d49c435983bda4c810a1ab5422b092416bd9df760933910f13cb22b8c9
Size: 10.51 MB - kernel-debug-core-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 06fdad363abf9484f56fdaafb5c6d4fc
SHA-256: d977fa074625e0d1b3d7163b4e06b67a86a813de56c0e2f8a93d36a2f7f1195b
Size: 72.83 MB - kernel-debug-devel-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 8eb709f66f30d6c05d9b947b0cc829c4
SHA-256: e5265178cc5db73b61e98f52411fd79cd89c24a0af241a1a1e1aef7c68add235
Size: 24.35 MB - kernel-debug-modules-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 1acf9f0ea5b303f524029cd223c04353
SHA-256: bc46aad3404118a65588a78dd84342b30b30253504a07407759d1e895895f66b
Size: 65.96 MB - kernel-debug-modules-extra-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: c9d4b065c19e389cb9440d0b890dfe42
SHA-256: c384767c94d1210d6de915fee88b6c5cd45fed9d1df94df972d7576a841aeebf
Size: 11.89 MB - kernel-devel-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 1b148229b4e2101fbcc8bcc1f8892e2e
SHA-256: 183d3b0a1f95b0a6ee9b9000db2b4d038bc6f9d09ba9692cb4dfe8a28ec02647
Size: 24.15 MB - kernel-doc-4.18.0-553.79.1.el8_10.noarch.rpm
MD5: 6a892a9c01fc374d1a1748d80e6a74fc
SHA-256: 01493d0da5bdbda5d564444b595b35b96eb7d9020467e59e144b1a5aae962409
Size: 28.37 MB - kernel-headers-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 7533c63f985dc4d8e20d520705e6d167
SHA-256: 3c8240dce0ddf684c8de87262827350c745222dff9ad5bdf0fa685bdddd026e6
Size: 11.86 MB - kernel-modules-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 6d0b338ad63560e3ba8fc34193cfde13
SHA-256: 4918fba9ae8ddd6998c5200cc0f092c1669514fab49f17fe19ff2ef7d9d364f9
Size: 36.33 MB - kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: ca7e59ed85b26312528db474a8a9e3dc
SHA-256: c2fdc318898192ccf45b86b796b29b26e01de74ab4a014564ac1935d7e703492
Size: 11.20 MB - kernel-tools-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: e39d23c63b0aacdffb465ba0fe717ff0
SHA-256: 0381d8503f42f5ea9d9adcb740dbdae8fa7c619b6a597c4645323ffd2471b5b1
Size: 10.73 MB - kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 5b5e25802a2e1eff9ba15deab8aacd69
SHA-256: 840d038b4b73a41a265c0a1d000b98918d36159f647aa82804bed90719f0da4a
Size: 10.52 MB - kernel-tools-libs-devel-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: 6940e67699c42f0071ee74687b0a4354
SHA-256: b2c08d2fbae13e9a97e4ebd5d20ff026c99826fed1f573bdc26cfef9f11e1141
Size: 10.51 MB - perf-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: fa6a39f3af414e5870d6d4917eecde3b
SHA-256: 537ca9cf39502c18abe561836b79ba6a13fca81f5bf2ee4ae0b4517330f2c187
Size: 12.83 MB - python3-perf-4.18.0-553.79.1.el8_10.x86_64.rpm
MD5: def86d2e2a756ebc2177b5161bd1932e
SHA-256: ecccb4d4846c2bbb62bb6c34aa67e45a58ab257772fb60fbeadc09257f329f6c
Size: 10.64 MB