kernel-4.18.0-553.80.1.el8_10
エラータID: AXSA:2025-10994:83
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
* kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751)
* kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2025-39751
REJECTED
CVE-2025-39757
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.
N/A
SRPMS
- kernel-4.18.0-553.80.1.el8_10.src.rpm
MD5: a3ca6b2dd49e7290951ce2342d08eba8
SHA-256: 10929d6ffe7d6a1ad33b7152b90b8d6ffce702549f5592ea8647cdd7bc79d359
Size: 132.28 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 72e328c462ce54de96cb835f8ce4f657
SHA-256: 09842a5feda1b4c88f23cabfcee7b0f06988767c6bfa04ca5bb46bfefce6294d
Size: 11.24 MB - kernel-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 934b6bb1ffe4439e0b4345ecc6975b7f
SHA-256: c596a61656ce2b82cd3483999809caf783833ce433c83cb19a243020fb2b6703
Size: 10.51 MB - kernel-abi-stablelists-4.18.0-553.80.1.el8_10.noarch.rpm
MD5: 31c7113ba78d063523f539396df2575c
SHA-256: 755bb5359d33e1407a17d268244a73e90d994f6928f3950b63a679016ea41d23
Size: 10.53 MB - kernel-core-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: fedf3b1f4e99ee48e8c06399b2d09fde
SHA-256: dbf13afe1012860580cac016191881749a7cd03d24915680b363f698167c351a
Size: 43.54 MB - kernel-cross-headers-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: a27d51f3bf697e39878b9df61d790e61
SHA-256: bdf4e1b3f573665f7f23a3beb01b9c3f2c2889b4d57918e6b5518f42e5fa9c02
Size: 15.86 MB - kernel-debug-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 7b447e07818b073b5694ec45bc360e03
SHA-256: 52ddefe85a81185761b87fb0513b1d8729ecbb75336792f8369bf63a936a7e70
Size: 10.51 MB - kernel-debug-core-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 44dfd4a5ae00e8a13b3eea1e2e4cc3e8
SHA-256: ecf1075ecf55452a5e5064c448d19134701d6cb42b0d6126f7f15ad68b2b5861
Size: 72.84 MB - kernel-debug-devel-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 0a05f6dcd53dd04642bf1c4ac00e6b5c
SHA-256: ba6fa9bf4c2e14134c57b3c1438ce2fd6f25aeffb30db12c162fb7468e31a43c
Size: 24.35 MB - kernel-debug-modules-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 24096dc308704647167bb3fad85f7522
SHA-256: 74ef8734dd165f8b57ddc6798c4f59bda2519202b61e022d9ffa5b32e005ab0f
Size: 65.93 MB - kernel-debug-modules-extra-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 1885458b5ffd1fd38ecde8286c0068b5
SHA-256: ef03e99e653869bb354ecea77586dfd943e01d22de7ad6f8a11adc38a1882846
Size: 11.89 MB - kernel-devel-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 0f66d4d1ba494c58322210e3e4b93950
SHA-256: 91c717348b71a322307b925d5d158ea3b00a859a594f864022edcb8068d43db2
Size: 24.14 MB - kernel-doc-4.18.0-553.80.1.el8_10.noarch.rpm
MD5: 3a21f46ff53eacc7f5b54a479a14ed42
SHA-256: 52168bcf10b74be3c841d3a6c579aae5757e6018255fdef08f8eff23a03ba646
Size: 28.38 MB - kernel-headers-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: edbd132e2c65d0a69dfead25f8225345
SHA-256: e7f06b8126d8192ff249a81a87ed4319bdc494ebfc1ea18c3cbb430d9b1314ff
Size: 11.86 MB - kernel-modules-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 0fbc9786046299ab5406fac5e062731e
SHA-256: e42bfee17e03bdf866d9b3bb13ebfe45a37eb45fb39432b9eeacc05eeb825196
Size: 36.33 MB - kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: e2b342bab3458905e31fa0e989e0e480
SHA-256: 3acba547f064a5e9a4a7a474d3ba71dc756b65154dad690e21c78103e1d597a9
Size: 11.20 MB - kernel-tools-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 6f6464bbbb9bf2c2c85b5961a66e2b5b
SHA-256: 122a94a625876b28f8a6643523b66a15da65ac899460ab99dad031b2b60f8831
Size: 10.73 MB - kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 25bb940b7587257ad2e7af9f0ae9dacc
SHA-256: f8ef4a9f097ccab6e990d13fecf70bc8b386ed491001f288e4625d76284c91b8
Size: 10.52 MB - kernel-tools-libs-devel-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 1434491d0faf9d53bf312de5c958b0d1
SHA-256: c3af3dfc76cb719fd30f5dbd2eadcb5d48d93075b75ea5d307518190c5104c34
Size: 10.51 MB - perf-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 88cf2a42043b8f6c6b15ae7caa1bd8ff
SHA-256: 25ae4a62718468791b7625dc0211efe6e2c782ee1c4ae23e2dc8aed3ef597117
Size: 12.83 MB - python3-perf-4.18.0-553.80.1.el8_10.x86_64.rpm
MD5: 74ad5d5844f9a5e666325ab1e31cc9ca
SHA-256: e04aa837cc2e0f5a45ebdc1508c876d27b2e5258ce99cb13d46bf327dd2c289c
Size: 10.64 MB