kernel-4.18.0-553.53.1.el8_10

エラータID: AXSA:2025-9967:33

Release date: 
Thursday, May 29, 2025 - 10:25
Subject: 
kernel-4.18.0-553.53.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906)
* kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-40906
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Always stop health timer during driver removal Currently, if teardown_hca fails to execute during driver removal, mlx5 does not stop the health timer. Afterwards, mlx5 continue with driver teardown. This may lead to a UAF bug, which results in page fault Oops[1], since the health timer invokes after resources were freed. Hence, stop the health monitor even if teardown_hca fails. [1] mlx5_core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0) mlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0) mlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0) mlx5_core 0000:18:00.0: E-Switch: cleanup mlx5_core 0000:18:00.0: wait_func:1155:(pid 1967079): TEARDOWN_HCA(0x103) timeout. Will cause a leak of a command resource mlx5_core 0000:18:00.0: mlx5_function_close:1288:(pid 1967079): tear_down_hca failed, skip cleanup BUG: unable to handle page fault for address: ffffa26487064230 PGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 0 PID: 0 Comm: swapper/0 Tainted: G OE ------- --- 6.7.0-68.fc38.x86_64 #1 Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020 RIP: 0010:ioread32be+0x34/0x60 RSP: 0018:ffffa26480003e58 EFLAGS: 00010292 RAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0 RDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230 RBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8 R10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0 R13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0 FS: 0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: ? __die+0x23/0x70 ? page_fault_oops+0x171/0x4e0 ? exc_page_fault+0x175/0x180 ? asm_exc_page_fault+0x26/0x30 ? __pfx_poll_health+0x10/0x10 [mlx5_core] ? __pfx_poll_health+0x10/0x10 [mlx5_core] ? ioread32be+0x34/0x60 mlx5_health_check_fatal_sensors+0x20/0x100 [mlx5_core] ? __pfx_poll_health+0x10/0x10 [mlx5_core] poll_health+0x42/0x230 [mlx5_core] ? __next_timer_interrupt+0xbc/0x110 ? __pfx_poll_health+0x10/0x10 [mlx5_core] call_timer_fn+0x21/0x130 ? __pfx_poll_health+0x10/0x10 [mlx5_core] __run_timers+0x222/0x2c0 run_timer_softirq+0x1d/0x40 __do_softirq+0xc9/0x2c8 __irq_exit_rcu+0xa6/0xc0 sysvec_apic_timer_interrupt+0x72/0x90 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:cpuidle_enter_state+0xcc/0x440 ? cpuidle_enter_state+0xbd/0x440 cpuidle_enter+0x2d/0x40 do_idle+0x20d/0x270 cpu_startup_entry+0x2a/0x30 rest_init+0xd0/0xd0 arch_call_rest_init+0xe/0x30 start_kernel+0x709/0xa90 x86_64_start_reservations+0x18/0x30 x86_64_start_kernel+0x96/0xa0 secondary_startup_64_no_verify+0x18f/0x19b ---[ end trace 0000000000000000 ]---
CVE-2024-44970
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink When all the strides in a WQE have been consumed, the WQE is unlinked from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible to receive CQEs with 0 consumed strides for the same WQE even after the WQE is fully consumed and unlinked. This triggers an additional unlink for the same wqe which corrupts the linked list. Fix this scenario by accepting 0 sized consumed strides without unlinking the WQE again.
CVE-2025-21756
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 __vsock_bind+0x62e/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 __kasan_slab_alloc+0x85/0x90 kmem_cache_alloc_noprof+0x131/0x450 sk_prot_alloc+0x5b/0x220 sk_alloc+0x2c/0x870 __vsock_create.constprop.0+0x2e/0xb60 vsock_create+0xe4/0x420 __sock_create+0x241/0x650 __sys_socket+0xf2/0x1a0 __x64_sys_socket+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 kasan_save_free_info+0x37/0x60 __kasan_slab_free+0x4b/0x70 kmem_cache_free+0x1a1/0x590 __sk_destruct+0x388/0x5a0 __vsock_bind+0x5e1/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150 RIP: 0010:refcount_warn_saturate+0xce/0x150 __vsock_bind+0x66d/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: underflow; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150 RIP: 0010:refcount_warn_saturate+0xee/0x150 vsock_remove_bound+0x187/0x1e0 __vsock_release+0x383/0x4a0 vsock_release+0x90/0x120 __sock_release+0xa3/0x250 sock_close+0x14/0x20 __fput+0x359/0xa80 task_work_run+0x107/0x1d0 do_exit+0x847/0x2560 do_group_exit+0xb8/0x250 __x64_sys_exit_group+0x3a/0x50 x64_sys_call+0xfec/0x14f0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.53.1.el8_10.src.rpm
    MD5: 360570693ca09d73b8061bbae5574163
    SHA-256: 6fb425b7c696c70f3ac6c0369e2c81db46aa7c1da82ff6e5d3cebcba979919ac
    Size: 132.22 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 2ccee95b616d4d7770dc781efdace80d
    SHA-256: 26d2040eba500b5a2f6107fda80a9b658f1ddfe810472962ad3adf5c81f6987e
    Size: 11.21 MB
  2. kernel-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: ddb2b3e4f86e93edb4eced044c989ad1
    SHA-256: 95683ca83d81c73ef4e84bdef6fd61d141a51ad1ef44b0627b81cac000348a66
    Size: 10.49 MB
  3. kernel-abi-stablelists-4.18.0-553.53.1.el8_10.noarch.rpm
    MD5: 31347bac7d1ba4c62599a5000d8ae11e
    SHA-256: 334a8d3c3ab118edc68ccd0ffb95758296a2dcf34ad5f425e94fa2526fa16cdc
    Size: 10.50 MB
  4. kernel-core-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 01c80e3bcfe03acb9793d4c76f687123
    SHA-256: 45a8312305ba78e972700ac4fd3b2714c9d7ade378a7ff1541cf88f36035a076
    Size: 43.52 MB
  5. kernel-cross-headers-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 2af12de01d4f44c65d3a6943ab24afa5
    SHA-256: dd13e11523c7fccdc931685dfad22e933720e30b7e8edd667db4e1ccadb55600
    Size: 15.83 MB
  6. kernel-debug-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 75fdcd63781746df7dba9e564a3ae31c
    SHA-256: b48e5e38ca689130ac67d1b78defb930e997baed95c105af2701cbb7d0faf6cd
    Size: 10.48 MB
  7. kernel-debug-core-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 5743baec6ef6b30db5832cc131729f63
    SHA-256: 2eae78251f976e0d177f3c73647fd6434641983067c4fc33a3be4f54057395cd
    Size: 72.80 MB
  8. kernel-debug-devel-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 10828b4d6a972a4d846ce8da35ab2054
    SHA-256: 50788eeb1a8380aa5d275a2f56a270500b0291a228d95765e7c801e12740fefd
    Size: 24.31 MB
  9. kernel-debug-modules-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 07933038e783573738728af0d39be579
    SHA-256: 87d3640ac2b239a622be364b4b27bb63e867f0e04f72d1451ffdae341e035181
    Size: 65.91 MB
  10. kernel-debug-modules-extra-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 1dab7453456bdbd2f7e95c5da3c06315
    SHA-256: c3739ad41c8d544432f6572bfd72e14f066f0f6a2c175d94786ce1115de4ff68
    Size: 11.86 MB
  11. kernel-devel-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 6d9700b23ac907f9818a200675cca423
    SHA-256: a4f74c3f78bc124c15fa3740c5bc2e7da5afde452b6f3f5f7d7fd6bbecb12bbf
    Size: 24.11 MB
  12. kernel-doc-4.18.0-553.53.1.el8_10.noarch.rpm
    MD5: 8502f332fb080ee72cf32dd956329be3
    SHA-256: 1ba4092798894ae26cf29430c703af53cee12e1b724603cb31b3eeca19bab87f
    Size: 28.35 MB
  13. kernel-headers-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: aaf9a8ade5998252e55d3295b91db798
    SHA-256: d11029b1d0252cd0449e8f10537c4d095a2dff0000a37532fc5680cc2e4a28af
    Size: 11.84 MB
  14. kernel-modules-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 8b3fffcb3c24130dcc5b157f348423bd
    SHA-256: afd7da17589daa4c0abd37fcda7d504266c4216d63f967a6c6de418251f9753b
    Size: 36.30 MB
  15. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 15d8b5ad9f3bc03f550576e424980877
    SHA-256: a7bf47959a4a96aff2287b7c71b62474f1e2f2c47293e0e1d21fc5180616ee37
    Size: 11.17 MB
  16. kernel-tools-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 7aba207af335cf39593b5e7548081447
    SHA-256: 37f4ca420826d27c3a5c433d4c4fc7972722e7c01508c144efbb4722722715d9
    Size: 10.70 MB
  17. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 610dccd4b6ea776362448d38e639944a
    SHA-256: 06b6af9729c12a5824dfd06e3944d52b93e9fb929f5035c5e926d9591f8502b4
    Size: 10.49 MB
  18. kernel-tools-libs-devel-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 372a50541493803a037f43a5f216e1ad
    SHA-256: 9367c9da57fa6d5ce9201e1e39b0a31f77347395af9245fcd30f9487d4c18adf
    Size: 10.49 MB
  19. perf-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 00aea82d25c5362da816369fc8529069
    SHA-256: 3bd168dc10454d27e7bcca2714dee685bd07eac125bc896b18afb9aa63f3ac32
    Size: 12.80 MB
  20. python3-perf-4.18.0-553.53.1.el8_10.x86_64.rpm
    MD5: 87249ed9ccfb5240ac249582da513ad6
    SHA-256: a0d80d36b108f9e7c93863434ae9f5fa5129b102d4c4bf64be5a16b1669c958d
    Size: 10.61 MB