kernel-3.10.0-1160.119.1.0.10.el7.AXS7
エラータID: AXSA:2025-9862:27
The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.
Security Fix(es):
* drm: nv04: Fix out of bounds access {CVE-2024-27008}
* media: uvcvideo: Fix double free in error path {CVE-2024-57980}
CVE(s):
CVE-2024-27008
In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access When Output Resource (dcb->or) value is assigned in fabricate_dcb_output(), there may be out of bounds access to dac_users array in case dcb->or is zero because ffs(dcb->or) is used as index there. The 'or' argument of fabricate_dcb_output() must be interpreted as a number of bit to set, not value. Utilize macros from 'enum nouveau_or' in calls instead of hardcoding. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda
Update packages.
In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access When Output Resource (dcb->or) value is assigned in fabricate_dcb_output(), there may be out of bounds access to dac_users array in case dcb->or is zero because ffs(dcb->or) is used as index there. The 'or' argument of fabricate_dcb_output() must be interpreted as a number of bit to set, not value. Utilize macros from 'enum nouveau_or' in calls instead of hardcoding. Found by Linux Verification Center (linuxtesting.org) with SVACE.
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda
N/A
Asianux Server 7 for x86_64
- bpftool-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 9fa2123eb5f240cb723bdf6650e5980e
SHA-256: 8ab54b28d3d7c52c346fcc1a8a8a39857f5967cd71ea428676cfca59a35ce6d4
Size: 8.54 MB - kernel-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 8f69df4024d1f214c568a272f6014607
SHA-256: 998d800dd875fe79906caf55b366f56be741c997acf15e143b12e07cb6f7e7c4
Size: 51.75 MB - kernel-abi-whitelists-3.10.0-1160.119.1.0.10.el7.AXS7.noarch.rpm
MD5: 0e64233c009927115dbeb1689e07cd36
SHA-256: 083333dd5b46963508f50de9e1fd80f7c5b6d53482ff0b4e41717b212e9a9ce7
Size: 8.11 MB - kernel-debug-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 5bc95c2c7562b14e82371384812796e8
SHA-256: b8e26affc9b8d4b945419cdbb107a7233ee84fae0f9eb682ee2db7e11a493772
Size: 54.06 MB - kernel-debug-devel-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 758752502ade59939eb6517d1b5954a7
SHA-256: a3b83182a92441342e0c0f329729a2d0db3b5802fae89876783c1e3bb4a7b1eb
Size: 18.15 MB - kernel-devel-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 851b30f0f7a5fc862c2f624056697c3f
SHA-256: b84837506bc7d4c0883d5742c8e280a1d1f2b71cb10733cae3382fe402875a34
Size: 18.09 MB - kernel-doc-3.10.0-1160.119.1.0.10.el7.AXS7.noarch.rpm
MD5: 2aa692066ffa8324c7d9f0ece72220d8
SHA-256: fd21cf1e31965e20e8c7c98405b4f26da6b8b96dc4fab71ded8a8853bd9035a2
Size: 19.57 MB - kernel-headers-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 899d5f3d05233c6620805cb52dd5ddc9
SHA-256: 7070b8fee2974ce01382d54de91157f3be4d1a1860cbca4b9d56780fce2d3bdf
Size: 9.10 MB - kernel-tools-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 95c5ab8f96216079487de780008e53ef
SHA-256: 6505889f369972544c3fadd0caabd6211f43f46f42e07b58a24a982b4f978ac6
Size: 8.21 MB - kernel-tools-libs-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: fc951f9a23eed32615c1caf1d4f42ffd
SHA-256: d44948776224404e4771571378b9b5209ddc4ac302155248c09edac37e08ef29
Size: 8.11 MB - perf-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 958a7bd03e3ef09a656f46e271cae460
SHA-256: b7ab238ce3cc18778029efb5ff3651185df8e536f35822b092025150b67085f9
Size: 9.75 MB - python-perf-3.10.0-1160.119.1.0.10.el7.AXS7.x86_64.rpm
MD5: 9ca334793ed60974e88965c1f30f0813
SHA-256: d32b4ce3e59bb441b59dde81574235683dd8b3903189e3d318ddd53c2952f696
Size: 8.20 MB