kernel-4.18.0-553.69.1.el8_10

エラータID: AXSA:2025-10764:56

Release date: 
Thursday, August 21, 2025 - 13:18
Subject: 
kernel-4.18.0-553.69.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-47670
In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.
CVE-2024-56644
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by the TCP socket for which the connection is timing out. The refcount made by the socket is never released. The refcount of the dst is decremented in sk_dst_reset() but that decrement is counteracted by a dst_hold() intentionally placed just before the sk_dst_reset() in ip6_negative_advice(). After ip6_negative_advice() has finished, there is no other object tied to the dst. The socket lost its reference stored in sk_dst_cache and the dst is no longer in the exception table. The exception dst becomes a leaked object. As a result of this dst leak, an unbalanced refcount is reported for the loopback device of a net namespace being destroyed under kernels that do not contain e5f80fcf869a ("ipv6: give an IPv6 dev to blackhole_netdev"): unregister_netdevice: waiting for lo to become free. Usage count = 2 Fix the dst leak by removing the dst_hold() in ip6_negative_advice(). The patch that introduced the dst_hold() in ip6_negative_advice() was 92f1655aa2b22 ("net: fix __dst_negative_advice() race"). But 92f1655aa2b22 merely refactored the code with regards to the dst refcount so the issue was present even before 92f1655aa2b22. The bug was introduced in 54c1a859efd9f ("ipv6: Don't drop cache route entry unless timer actually expired.") where the expired cached route is deleted and the sk_dst_cache member of the socket is set to NULL by calling dst_negative_advice() but the refcount belonging to the socket is left unbalanced. The IPv4 version - ipv4_negative_advice() - is not affected by this bug. When the TCP connection times out ipv4_negative_advice() merely resets the sk_dst_cache of the socket while decrementing the refcount of the exception dst.
CVE-2025-21727
In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder A bug was found when run ltp test: BUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0 Read of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206 CPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+ Workqueue: pdecrypt_parallel padata_parallel_worker Call Trace: dump_stack_lvl+0x32/0x50 print_address_description.constprop.0+0x6b/0x3d0 print_report+0xdd/0x2c0 kasan_report+0xa5/0xd0 padata_find_next+0x29/0x1a0 padata_reorder+0x131/0x220 padata_parallel_worker+0x3d/0xc0 process_one_work+0x2ec/0x5a0 If 'mdelay(10)' is added before calling 'padata_find_next' in the 'padata_reorder' function, this issue could be reproduced easily with ltp test (pcrypt_aead01). This can be explained as bellow: pcrypt_aead_encrypt ... padata_do_parallel refcount_inc(&pd->refcnt); // add refcnt ... padata_do_serial padata_reorder // pd while (1) { padata_find_next(pd, true); // using pd queue_work_on ... padata_serial_worker crypto_del_alg padata_put_pd_cnt // sub refcnt padata_free_shell padata_put_pd(ps->pd); // pd is freed // loop again, but pd is freed // call padata_find_next, UAF } In the padata_reorder function, when it loops in 'while', if the alg is deleted, the refcnt may be decreased to 0 before entering 'padata_find_next', which leads to UAF. As mentioned in [1], do_serial is supposed to be called with BHs disabled and always happen under RCU protection, to address this issue, add synchronize_rcu() in 'padata_free_shell' wait for all _do_serial calls to finish. [1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.lo... [2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2e...@fq426cwnjtkm/
CVE-2025-21759
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
CVE-2025-38085
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race huge_pmd_unshare() drops a reference on a page table that may have previously been shared across processes, potentially turning it into a normal page table used in another process in which unrelated VMAs can afterwards be installed. If this happens in the middle of a concurrent gup_fast(), gup_fast() could end up walking the page tables of another process. While I don't see any way in which that immediately leads to kernel memory corruption, it is really weird and unexpected. Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(), just like we do in khugepaged when removing page tables for a THP collapse.
CVE-2025-38159
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the size to 6 instead of 2, since 'para' array is passed to 'rtw_fw_bt_wifi_control(rtwdev, para[0], &para[1])', which reads 5 bytes: void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data) { ... SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data); SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1)); ... SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4)); Detected using the static analysis tool - Svace.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.69.1.el8_10.src.rpm
    MD5: aa92a887ae25634655d82c5e2b721343
    SHA-256: 2aad72ba9694176cfa70efe197667cb36a6ebd36e5f30d89bb8621aeed9a1545
    Size: 132.25 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 737c12960113e8ac3315477045ffe80e
    SHA-256: 2b9a0075af4ee6a92fb57d680eca68fbdc481db3bcb96c6d824b8e82e5c06194
    Size: 11.23 MB
  2. kernel-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 609053036667c6b4e191b2147b7d7e9d
    SHA-256: 47bcf02012041fa771d0546d5d2c8778496bcaa3b1fd76132b74b84bfa8746cb
    Size: 10.50 MB
  3. kernel-abi-stablelists-4.18.0-553.69.1.el8_10.noarch.rpm
    MD5: 9e5ccd9b74589328df33aa55284b93ae
    SHA-256: e43d2128b2cc11f1964decc0699ed890b2f037a60278c69fcccec720b1d55d72
    Size: 10.52 MB
  4. kernel-core-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: bec60f13654460c635645ca52836520c
    SHA-256: 73f432694e48bddb0195127af2d2c6b3454a13940610d89c5dac5c2edb0bc3b4
    Size: 43.53 MB
  5. kernel-cross-headers-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: c86e6aabd90e056f491c5e1a43f470b6
    SHA-256: e2694b884618dc12952e541b2645f170eb15835004b84107dbdbeda9a141d73b
    Size: 15.85 MB
  6. kernel-debug-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: e1b842e862bc492579ec188c546c5e17
    SHA-256: 3f76bf63746bad9aad337703f31f77461d4ddd61e99098b2efbbd7f608409cec
    Size: 10.50 MB
  7. kernel-debug-core-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 5d6ccb8dad2f19b78988613bb7532806
    SHA-256: 6da54a824da33f7a82e1b5790d41a2b04717ee3659e9376c210e3732a24a5ea6
    Size: 72.82 MB
  8. kernel-debug-devel-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 4629af16d4e04feea4ac230c3123bbe9
    SHA-256: a1af54a45c249c248a8629b352e17b03f2d6b5b857e3d36b843be0afb1427153
    Size: 24.34 MB
  9. kernel-debug-modules-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: b54374e1e2b510bc6bd4f73d05ea52f0
    SHA-256: be6a914bbcd603714854e8f48e9df1ade9db451d6118041c03c7a60dbd0a1c03
    Size: 65.93 MB
  10. kernel-debug-modules-extra-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 411fb74b09df50b2b9ccbda99ca6e6ef
    SHA-256: 050aa9223052c09fe4166447b89b280edc585ec90fef2706c69601f51ebe205f
    Size: 11.88 MB
  11. kernel-devel-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 98575a9557db814f744437b5c5d94f29
    SHA-256: d53fa14dfc4cfa78b8823671341671d11cc560118638275668690226db6617c8
    Size: 24.13 MB
  12. kernel-doc-4.18.0-553.69.1.el8_10.noarch.rpm
    MD5: 6ac30a331c85c1d6b13faad390d1f852
    SHA-256: 048319f19530829e0c3726b75ee037aa208df47eff527c2b8ded70085fc7f3a7
    Size: 28.36 MB
  13. kernel-headers-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 62003fb25f02ee3d2577766aa4fda5cf
    SHA-256: 248fb568723e0f6dae3d107c2c786bc7de1f70b3ad01766c836ba0eebfc78676
    Size: 11.85 MB
  14. kernel-modules-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 6be9605b966d0fc4d9071a4d59739e9d
    SHA-256: 6b2ae34bcec5d309e6d7ced6e6ca2bfc93ad09713658014dddfcfd3fccb83167
    Size: 36.32 MB
  15. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 41047d31594cd7148db6e15e8af8e048
    SHA-256: d70078bf4848da23f9f6fee37253bbb493f9689b896d513db44780c1e134774e
    Size: 11.19 MB
  16. kernel-tools-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 4c52f5778ff0ef3810af2bd2ea149977
    SHA-256: ce6d05f55abf4cc497a2f6159ae69ad2e9d95fc81a87516b4d900eb216f47070
    Size: 10.72 MB
  17. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: cc692a069618621c58022cc971a43920
    SHA-256: 25139ba5e4ed58261d14bafdf6b2f68b6e8866e4c3a9f353b12a9fa34507de0b
    Size: 10.51 MB
  18. kernel-tools-libs-devel-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: dd37bc84eb4ce53a56fea9f8f731869f
    SHA-256: c021bdde5c83fbe4a2362baf7883886382181b568f5f85c6f7af27ee848e18cd
    Size: 10.50 MB
  19. perf-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 712a47230405f773cb01cbf70bf91479
    SHA-256: e14de6fab22a72029bb4445e069b6b62945242f095d3a757d79ded91fb7ee365
    Size: 12.82 MB
  20. python3-perf-4.18.0-553.69.1.el8_10.x86_64.rpm
    MD5: 4382b722059104c8a6d979e5ee3f3a12
    SHA-256: 36d6cd4e5078dbbcd83cdfe890f70728e2422cf282925072dfa08036bb423722
    Size: 10.63 MB