kernel-5.14.0-570.35.1.el9_6
エラータID: AXSA:2025-10804:61
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (CVE-2025-21867)
* microcode_ctl: From CVEorg collector (CVE-2024-28956)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: net: fix udp gso skb_segment after pull from frag_list (CVE-2025-38124)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush() (CVE-2025-38250)
* kernel: i2c/designware: Fix an initialization issue (CVE-2025-38380)
* kernel: tls: always refresh the queue when reading sock (CVE-2025-38471)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-28956
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2025-21867
In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The cause of the issue was that eth_skb_pkt_type() accessed skb's data that didn't contain an Ethernet header. This occurs when bpf_prog_test_run_xdp() passes an invalid value as the user_data argument to bpf_test_init(). Fix this by returning an error when user_data is less than ETH_HLEN in bpf_test_init(). Additionally, remove the check for "if (user_size > size)" as it is unnecessary. [1] BUG: KMSAN: use-after-free in eth_skb_pkt_type include/linux/etherdevice.h:627 [inline] BUG: KMSAN: use-after-free in eth_type_trans+0x4ee/0x980 net/ethernet/eth.c:165 eth_skb_pkt_type include/linux/etherdevice.h:627 [inline] eth_type_trans+0x4ee/0x980 net/ethernet/eth.c:165 __xdp_build_skb_from_frame+0x5a8/0xa50 net/core/xdp.c:635 xdp_recv_frames net/bpf/test_run.c:272 [inline] xdp_test_run_batch net/bpf/test_run.c:361 [inline] bpf_test_run_xdp_live+0x2954/0x3330 net/bpf/test_run.c:390 bpf_prog_test_run_xdp+0x148e/0x1b10 net/bpf/test_run.c:1318 bpf_prog_test_run+0x5b7/0xa30 kernel/bpf/syscall.c:4371 __sys_bpf+0x6a6/0xe20 kernel/bpf/syscall.c:5777 __do_sys_bpf kernel/bpf/syscall.c:5866 [inline] __se_sys_bpf kernel/bpf/syscall.c:5864 [inline] __x64_sys_bpf+0xa4/0xf0 kernel/bpf/syscall.c:5864 x64_sys_call+0x2ea0/0x3d90 arch/x86/include/generated/asm/syscalls_64.h:322 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xd9/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: free_pages_prepare mm/page_alloc.c:1056 [inline] free_unref_page+0x156/0x1320 mm/page_alloc.c:2657 __free_pages+0xa3/0x1b0 mm/page_alloc.c:4838 bpf_ringbuf_free kernel/bpf/ringbuf.c:226 [inline] ringbuf_map_free+0xff/0x1e0 kernel/bpf/ringbuf.c:235 bpf_map_free kernel/bpf/syscall.c:838 [inline] bpf_map_free_deferred+0x17c/0x310 kernel/bpf/syscall.c:862 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa2b/0x1b60 kernel/workqueue.c:3310 worker_thread+0xedf/0x1550 kernel/workqueue.c:3391 kthread+0x535/0x6b0 kernel/kthread.c:389 ret_from_fork+0x6e/0x90 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 CPU: 1 UID: 0 PID: 17276 Comm: syz.1.16450 Not tainted 6.12.0-05490-g9bb88c659673 #8 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
CVE-2025-38084
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: unshare page tables during VMA split, not before Currently, __split_vma() triggers hugetlb page table unsharing through vm_ops->may_split(). This happens before the VMA lock and rmap locks are taken - which is too early, it allows racing VMA-locked page faults in our process and racing rmap walks from other processes to cause page tables to be shared again before we actually perform the split. Fix it by explicitly calling into the hugetlb unshare logic from __split_vma() in the same place where THP splitting also happens. At that point, both the VMA and the rmap(s) are write-locked. An annoying detail is that we can now call into the helper hugetlb_unshare_pmds() from two different locking contexts: 1. from hugetlb_split(), holding: - mmap lock (exclusively) - VMA lock - file rmap lock (exclusively) 2. hugetlb_unshare_all_pmds(), which I think is designed to be able to call us with only the mmap lock held (in shared mode), but currently only runs while holding mmap lock (exclusively) and VMA lock Backporting note: This commit fixes a racy protection that was introduced in commit b30c14cd6102 ("hugetlb: unshare some PMDs when splitting VMAs"); that commit claimed to fix an issue introduced in 5.13, but it should actually also go all the way back. [jannh@google.com: v2]
CVE-2025-38085
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race huge_pmd_unshare() drops a reference on a page table that may have previously been shared across processes, potentially turning it into a normal page table used in another process in which unrelated VMAs can afterwards be installed. If this happens in the middle of a concurrent gup_fast(), gup_fast() could end up walking the page tables of another process. While I don't see any way in which that immediately leads to kernel memory corruption, it is really weird and unexpected. Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(), just like we do in khugepaged when removing page tables for a THP collapse.
CVE-2025-38124
In the Linux kernel, the following vulnerability has been resolved: net: fix udp gso skb_segment after pull from frag_list Commit a1e40ac5b5e9 ("net: gso: fix udp gso fraglist segmentation after pull from frag_list") detected invalid geometry in frag_list skbs and redirects them from skb_segment_list to more robust skb_segment. But some packets with modified geometry can also hit bugs in that code. We don't know how many such cases exist. Addressing each one by one also requires touching the complex skb_segment code, which risks introducing bugs for other types of skbs. Instead, linearize all these packets that fail the basic invariants on gso fraglist skbs. That is more robust. If only part of the fraglist payload is pulled into head_skb, it will always cause exception when splitting skbs by skb_segment. For detailed call stack information, see below. Valid SKB_GSO_FRAGLIST skbs - consist of two or more segments - the head_skb holds the protocol headers plus first gso_size - one or more frag_list skbs hold exactly one segment - all but the last must be gso_size Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can modify fraglist skbs, breaking these invariants. In extreme cases they pull one part of data into skb linear. For UDP, this causes three payloads with lengths of (11,11,10) bytes were pulled tail to become (12,10,10) bytes. The skbs no longer meets the above SKB_GSO_FRAGLIST conditions because payload was pulled into head_skb, it needs to be linearized before pass to regular skb_segment. skb_segment+0xcd0/0xd14 __udp_gso_segment+0x334/0x5f4 udp4_ufo_fragment+0x118/0x15c inet_gso_segment+0x164/0x338 skb_mac_gso_segment+0xc4/0x13c __skb_gso_segment+0xc4/0x124 validate_xmit_skb+0x9c/0x2c0 validate_xmit_skb_list+0x4c/0x80 sch_direct_xmit+0x70/0x404 __dev_queue_xmit+0x64c/0xe5c neigh_resolve_output+0x178/0x1c4 ip_finish_output2+0x37c/0x47c __ip_finish_output+0x194/0x240 ip_finish_output+0x20/0xf4 ip_output+0x100/0x1a0 NF_HOOK+0xc4/0x16c ip_forward+0x314/0x32c ip_rcv+0x90/0x118 __netif_receive_skb+0x74/0x124 process_backlog+0xe8/0x1a4 __napi_poll+0x5c/0x1f8 net_rx_action+0x154/0x314 handle_softirqs+0x154/0x4b8 [118.376811] [C201134] rxq0_pus: [name:bug&]kernel BUG at net/core/skbuff.c:4278! [118.376829] [C201134] rxq0_pus: [name:traps&]Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP [118.470774] [C201134] rxq0_pus: [name:mrdump&]Kernel Offset: 0x178cc00000 from 0xffffffc008000000 [118.470810] [C201134] rxq0_pus: [name:mrdump&]PHYS_OFFSET: 0x40000000 [118.470827] [C201134] rxq0_pus: [name:mrdump&]pstate: 60400005 (nZCv daif +PAN -UAO) [118.470848] [C201134] rxq0_pus: [name:mrdump&]pc : [0xffffffd79598aefc] skb_segment+0xcd0/0xd14 [118.470900] [C201134] rxq0_pus: [name:mrdump&]lr : [0xffffffd79598a5e8] skb_segment+0x3bc/0xd14 [118.470928] [C201134] rxq0_pus: [name:mrdump&]sp : ffffffc008013770
CVE-2025-38159
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the size to 6 instead of 2, since 'para' array is passed to 'rtw_fw_bt_wifi_control(rtwdev, para[0], ¶[1])', which reads 5 bytes: void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data) { ... SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data); SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1)); ... SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4)); Detected using the static analysis tool - Svace.
CVE-2025-38250
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported use-after-free in vhci_flush() without repro. [0] From the splat, a thread close()d a vhci file descriptor while its device was being used by iotcl() on another thread. Once the last fd refcnt is released, vhci_release() calls hci_unregister_dev(), hci_free_dev(), and kfree() for struct vhci_data, which is set to hci_dev->dev->driver_data. The problem is that there is no synchronisation after unlinking hdev from hci_dev_list in hci_unregister_dev(). There might be another thread still accessing the hdev which was fetched before the unlink operation. We can use SRCU for such synchronisation. Let's run hci_dev_reset() under SRCU and wait for its completion in hci_unregister_dev(). Another option would be to restore hci_dev->destruct(), which was removed in commit 587ae086f6e4 ("Bluetooth: Remove unused hci-destruct cb"). However, this would not be a good solution, as we should not run hci_unregister_dev() while there are in-flight ioctl() requests, which could lead to another data-race KCSAN splat. Note that other drivers seem to have the same problem, for exmaple, virtbt_remove(). [0]: BUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline] BUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937 Read of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718 CPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xd2/0x2b0 mm/kasan/report.c:521 kasan_report+0x118/0x150 mm/kasan/report.c:634 skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline] skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937 skb_queue_purge include/linux/skbuff.h:3368 [inline] vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69 hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline] hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592 sock_do_ioctl+0xd9/0x300 net/socket.c:1190 sock_ioctl+0x576/0x790 net/socket.c:1311 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcf5b98e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929 RDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009 RBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528 Allocated by task 6535: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635 misc_open+0x2bc/0x330 drivers/char/misc.c:161 chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414 do_dentry_open+0xdf0/0x1970 fs/open.c:964 vfs_open+0x3b/0x340 fs/open.c:1094 do_open fs/namei.c:3887 [inline] path_openat+0x2ee5/0x3830 fs/name ---truncated---
CVE-2025-38380
In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().
CVE-2025-38471
In the Linux kernel, the following vulnerability has been resolved: tls: always refresh the queue when reading sock After recent changes in net-next TCP compacts skbs much more aggressively. This unearthed a bug in TLS where we may try to operate on an old skb when checking if all skbs in the queue have matching decrypt state and geometry. BUG: KASAN: slab-use-after-free in tls_strp_check_rcv+0x898/0x9a0 [tls] (net/tls/tls_strp.c:436 net/tls/tls_strp.c:530 net/tls/tls_strp.c:544) Read of size 4 at addr ffff888013085750 by task tls/13529 CPU: 2 UID: 0 PID: 13529 Comm: tls Not tainted 6.16.0-rc5-virtme Call Trace: kasan_report+0xca/0x100 tls_strp_check_rcv+0x898/0x9a0 [tls] tls_rx_rec_wait+0x2c9/0x8d0 [tls] tls_sw_recvmsg+0x40f/0x1aa0 [tls] inet_recvmsg+0x1c3/0x1f0 Always reload the queue, fast path is to have the record in the queue when we wake, anyway (IOW the path going down "if !strp->stm.full_len").
Update packages.
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The cause of the issue was that eth_skb_pkt_type() accessed skb's data that didn't contain an Ethernet header. This occurs when bpf_prog_test_run_xdp() passes an invalid value as the user_data argument to bpf_test_init(). Fix this by returning an error when user_data is less than ETH_HLEN in bpf_test_init(). Additionally, remove the check for "if (user_size > size)" as it is unnecessary. [1] BUG: KMSAN: use-after-free in eth_skb_pkt_type include/linux/etherdevice.h:627 [inline] BUG: KMSAN: use-after-free in eth_type_trans+0x4ee/0x980 net/ethernet/eth.c:165 eth_skb_pkt_type include/linux/etherdevice.h:627 [inline] eth_type_trans+0x4ee/0x980 net/ethernet/eth.c:165 __xdp_build_skb_from_frame+0x5a8/0xa50 net/core/xdp.c:635 xdp_recv_frames net/bpf/test_run.c:272 [inline] xdp_test_run_batch net/bpf/test_run.c:361 [inline] bpf_test_run_xdp_live+0x2954/0x3330 net/bpf/test_run.c:390 bpf_prog_test_run_xdp+0x148e/0x1b10 net/bpf/test_run.c:1318 bpf_prog_test_run+0x5b7/0xa30 kernel/bpf/syscall.c:4371 __sys_bpf+0x6a6/0xe20 kernel/bpf/syscall.c:5777 __do_sys_bpf kernel/bpf/syscall.c:5866 [inline] __se_sys_bpf kernel/bpf/syscall.c:5864 [inline] __x64_sys_bpf+0xa4/0xf0 kernel/bpf/syscall.c:5864 x64_sys_call+0x2ea0/0x3d90 arch/x86/include/generated/asm/syscalls_64.h:322 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xd9/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: free_pages_prepare mm/page_alloc.c:1056 [inline] free_unref_page+0x156/0x1320 mm/page_alloc.c:2657 __free_pages+0xa3/0x1b0 mm/page_alloc.c:4838 bpf_ringbuf_free kernel/bpf/ringbuf.c:226 [inline] ringbuf_map_free+0xff/0x1e0 kernel/bpf/ringbuf.c:235 bpf_map_free kernel/bpf/syscall.c:838 [inline] bpf_map_free_deferred+0x17c/0x310 kernel/bpf/syscall.c:862 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa2b/0x1b60 kernel/workqueue.c:3310 worker_thread+0xedf/0x1550 kernel/workqueue.c:3391 kthread+0x535/0x6b0 kernel/kthread.c:389 ret_from_fork+0x6e/0x90 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 CPU: 1 UID: 0 PID: 17276 Comm: syz.1.16450 Not tainted 6.12.0-05490-g9bb88c659673 #8 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: unshare page tables during VMA split, not before Currently, __split_vma() triggers hugetlb page table unsharing through vm_ops->may_split(). This happens before the VMA lock and rmap locks are taken - which is too early, it allows racing VMA-locked page faults in our process and racing rmap walks from other processes to cause page tables to be shared again before we actually perform the split. Fix it by explicitly calling into the hugetlb unshare logic from __split_vma() in the same place where THP splitting also happens. At that point, both the VMA and the rmap(s) are write-locked. An annoying detail is that we can now call into the helper hugetlb_unshare_pmds() from two different locking contexts: 1. from hugetlb_split(), holding: - mmap lock (exclusively) - VMA lock - file rmap lock (exclusively) 2. hugetlb_unshare_all_pmds(), which I think is designed to be able to call us with only the mmap lock held (in shared mode), but currently only runs while holding mmap lock (exclusively) and VMA lock Backporting note: This commit fixes a racy protection that was introduced in commit b30c14cd6102 ("hugetlb: unshare some PMDs when splitting VMAs"); that commit claimed to fix an issue introduced in 5.13, but it should actually also go all the way back. [jannh@google.com: v2]
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race huge_pmd_unshare() drops a reference on a page table that may have previously been shared across processes, potentially turning it into a normal page table used in another process in which unrelated VMAs can afterwards be installed. If this happens in the middle of a concurrent gup_fast(), gup_fast() could end up walking the page tables of another process. While I don't see any way in which that immediately leads to kernel memory corruption, it is really weird and unexpected. Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(), just like we do in khugepaged when removing page tables for a THP collapse.
In the Linux kernel, the following vulnerability has been resolved: net: fix udp gso skb_segment after pull from frag_list Commit a1e40ac5b5e9 ("net: gso: fix udp gso fraglist segmentation after pull from frag_list") detected invalid geometry in frag_list skbs and redirects them from skb_segment_list to more robust skb_segment. But some packets with modified geometry can also hit bugs in that code. We don't know how many such cases exist. Addressing each one by one also requires touching the complex skb_segment code, which risks introducing bugs for other types of skbs. Instead, linearize all these packets that fail the basic invariants on gso fraglist skbs. That is more robust. If only part of the fraglist payload is pulled into head_skb, it will always cause exception when splitting skbs by skb_segment. For detailed call stack information, see below. Valid SKB_GSO_FRAGLIST skbs - consist of two or more segments - the head_skb holds the protocol headers plus first gso_size - one or more frag_list skbs hold exactly one segment - all but the last must be gso_size Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can modify fraglist skbs, breaking these invariants. In extreme cases they pull one part of data into skb linear. For UDP, this causes three payloads with lengths of (11,11,10) bytes were pulled tail to become (12,10,10) bytes. The skbs no longer meets the above SKB_GSO_FRAGLIST conditions because payload was pulled into head_skb, it needs to be linearized before pass to regular skb_segment. skb_segment+0xcd0/0xd14 __udp_gso_segment+0x334/0x5f4 udp4_ufo_fragment+0x118/0x15c inet_gso_segment+0x164/0x338 skb_mac_gso_segment+0xc4/0x13c __skb_gso_segment+0xc4/0x124 validate_xmit_skb+0x9c/0x2c0 validate_xmit_skb_list+0x4c/0x80 sch_direct_xmit+0x70/0x404 __dev_queue_xmit+0x64c/0xe5c neigh_resolve_output+0x178/0x1c4 ip_finish_output2+0x37c/0x47c __ip_finish_output+0x194/0x240 ip_finish_output+0x20/0xf4 ip_output+0x100/0x1a0 NF_HOOK+0xc4/0x16c ip_forward+0x314/0x32c ip_rcv+0x90/0x118 __netif_receive_skb+0x74/0x124 process_backlog+0xe8/0x1a4 __napi_poll+0x5c/0x1f8 net_rx_action+0x154/0x314 handle_softirqs+0x154/0x4b8 [118.376811] [C201134] rxq0_pus: [name:bug&]kernel BUG at net/core/skbuff.c:4278! [118.376829] [C201134] rxq0_pus: [name:traps&]Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP [118.470774] [C201134] rxq0_pus: [name:mrdump&]Kernel Offset: 0x178cc00000 from 0xffffffc008000000 [118.470810] [C201134] rxq0_pus: [name:mrdump&]PHYS_OFFSET: 0x40000000 [118.470827] [C201134] rxq0_pus: [name:mrdump&]pstate: 60400005 (nZCv daif +PAN -UAO) [118.470848] [C201134] rxq0_pus: [name:mrdump&]pc : [0xffffffd79598aefc] skb_segment+0xcd0/0xd14 [118.470900] [C201134] rxq0_pus: [name:mrdump&]lr : [0xffffffd79598a5e8] skb_segment+0x3bc/0xd14 [118.470928] [C201134] rxq0_pus: [name:mrdump&]sp : ffffffc008013770
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the size to 6 instead of 2, since 'para' array is passed to 'rtw_fw_bt_wifi_control(rtwdev, para[0], ¶[1])', which reads 5 bytes: void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data) { ... SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data); SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1)); ... SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4)); Detected using the static analysis tool - Svace.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported use-after-free in vhci_flush() without repro. [0] From the splat, a thread close()d a vhci file descriptor while its device was being used by iotcl() on another thread. Once the last fd refcnt is released, vhci_release() calls hci_unregister_dev(), hci_free_dev(), and kfree() for struct vhci_data, which is set to hci_dev->dev->driver_data. The problem is that there is no synchronisation after unlinking hdev from hci_dev_list in hci_unregister_dev(). There might be another thread still accessing the hdev which was fetched before the unlink operation. We can use SRCU for such synchronisation. Let's run hci_dev_reset() under SRCU and wait for its completion in hci_unregister_dev(). Another option would be to restore hci_dev->destruct(), which was removed in commit 587ae086f6e4 ("Bluetooth: Remove unused hci-destruct cb"). However, this would not be a good solution, as we should not run hci_unregister_dev() while there are in-flight ioctl() requests, which could lead to another data-race KCSAN splat. Note that other drivers seem to have the same problem, for exmaple, virtbt_remove(). [0]: BUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline] BUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937 Read of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718 CPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().
In the Linux kernel, the following vulnerability has been resolved: tls: always refresh the queue when reading sock After recent changes in net-next TCP compacts skbs much more aggressively. This unearthed a bug in TLS where we may try to operate on an old skb when checking if all skbs in the queue have matching decrypt state and geometry. BUG: KASAN: slab-use-after-free in tls_strp_check_rcv+0x898/0x9a0 [tls] (net/tls/tls_strp.c:436 net/tls/tls_strp.c:530 net/tls/tls_strp.c:544) Read of size 4 at addr ffff888013085750 by task tls/13529 CPU: 2 UID: 0 PID: 13529 Comm: tls Not tainted 6.16.0-rc5-virtme Call Trace: kasan_report+0xca/0x100 tls_strp_check_rcv+0x898/0x9a0 [tls] tls_rx_rec_wait+0x2c9/0x8d0 [tls] tls_sw_recvmsg+0x40f/0x1aa0 [tls] inet_recvmsg+0x1c3/0x1f0 Always reload the queue, fast path is to have the record in the queue when we wake, anyway (IOW the path going down "if !strp->stm.full_len").
N/A
SRPMS
- kernel-5.14.0-570.35.1.el9_6.src.rpm
MD5: 9a8473e57bc6080c97031834686a78f2
SHA-256: 82af9b1b4945d5030b8ab38933a905ae0eb875c9e0f59e296ee24c4e7d68b66d
Size: 142.51 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 50107c508fbfec41837957f441104a06
SHA-256: ea9f4aab4a0d0e7c6925066e10889313939a5112e356386a83903c54309af84f
Size: 1.79 MB - kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm
MD5: aa299090472dfab19f618e6de13a15a3
SHA-256: 635df36f33042972f24a77089ab840abb57e027e39ce7d2936721360c3927b97
Size: 1.82 MB - kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: afbd3417853395d58c6a7d18a0c471d9
SHA-256: 4ed66fa2a1911c093fba2b05b5ebb540cc0852e2707c698dce7faa16d6ae7e30
Size: 17.87 MB - kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 9eec5711c65f7081350ef104ed48619c
SHA-256: 835f8453ff60aec18ff3545d3d99d812694e4368d0407f4812dd8b57bd22e692
Size: 8.66 MB - kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 7a0b143c96b73fe0f884370ee1f97f4c
SHA-256: d9a3b09a045b8e92b030cfd2534fbdf08b203eaff4d5e67e6082742f6fb564ae
Size: 1.79 MB - kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 035a58777d0bdfd4f61d5a30f501e413
SHA-256: 826bbcc2473d672ddcfc3e02a08b5c3683fcf311ba718f39b3747dbf1655abd8
Size: 31.30 MB - kernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 352947a92f777fe91a8e68d69db52a42
SHA-256: ba911f85bc74a0c89405a75799b7e6131c0ad0505a6e1cab3ca400346b1155b5
Size: 21.79 MB - kernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: cd1b55b3e53cc87355c9b0f32f4d7c3c
SHA-256: 7f68089acc9de3a68b1d563ba1e406ad21ddb178e4da7702d61828f83ce4cbb8
Size: 1.79 MB - kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: bb7f2272e3c06006a6abb985ddb29a5e
SHA-256: f9f6e23798d5f7b26e4cff8a421bd33e30fa1eafd3e382be5f7dfe6e332e17cd
Size: 67.40 MB - kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 2e6b2e9da9795b084cb75d7fb115e9b3
SHA-256: e096c6ab3736b8ae1220e08bfb4a1a2f0d9baec6c558c4bae0e6d20a0501c4de
Size: 48.91 MB - kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: b961e574ab4dd13725af41cf417c115d
SHA-256: 763c385241dcfefeb0416a531e4b8bb2cec2b42cde6082426bdd6dd5bbb01748
Size: 2.56 MB - kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 6653b256f3c7a16153840a3ca4577fec
SHA-256: 1eced4f15c016a76d34eb1a0c835cea969e3d181181ce721efcc800cd2f58f69
Size: 84.35 MB - kernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 5f03f422f7bad3f463d6941e7e2b0207
SHA-256: 669d9c2057ccd76e15877d4e19ed60e3768912e7b625dbcb22dbefe91447d12b
Size: 21.61 MB - kernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 0c521fdeb08846e3539d906e6005fdff
SHA-256: b6bb2ac8d0bf76a170377a4a9f1061faa7cb2f4a2617c6d85f2a7544baee3fab
Size: 1.79 MB - kernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm
MD5: d23a8f221eb81448a9cbbe1b80c3748c
SHA-256: ae502ef4d3fac3d3044fda7c433c2fa6f2d8f2096221e43d48150aa1478efab9
Size: 37.94 MB - kernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 6b5de4be4d26eaf290d080f732acc7fa
SHA-256: 0b952f7e95dc9ae81eee095f827d40950cebb76835fa2117a08cbd014899b25b
Size: 3.53 MB - kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 93a5c541c5cb10d3cf96f0511c712e47
SHA-256: 4237ee1f3016185f73316b7a97b1f9460aaa50f62a43a8d681f90fe838f5c57b
Size: 38.97 MB - kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 62e54b91f82f40a93a547f55ad13451a
SHA-256: 6d832f1dc6d7bd8a5ed8077179862ea2a1bb6433602408ef7f83e038bc780609
Size: 30.88 MB - kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 676ce322978db67d4ac439e75f328e14
SHA-256: b2f926749227f69193a560cef4ed9ae225cb28841336405ee69ca4f573b843e8
Size: 2.21 MB - kernel-rt-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 5b06912c2f8620f1237c61f5b13123e0
SHA-256: 2cc083e39f2d1a5d81c444d5e09a881ce8c521cd8d0d4a8262daaa190260fd57
Size: 1.79 MB - kernel-rt-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 31a67b4b99ed85a4c1e6da25dee32884
SHA-256: f7122abf35ecabe1dbc943711c00a397bf240f6e776c0c04c19541191fb41f28
Size: 17.76 MB - kernel-rt-debug-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 444cafb9cbf2fe8bec0c0d67ffb07535
SHA-256: 1105d2419451116ca7b2538f1f8e1b8db9daaab2bcdddb4501c2fca6eb81fbd1
Size: 1.79 MB - kernel-rt-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 4fde7077771a50a6cf2b076d56465d01
SHA-256: 33dcbf1dcb1eb382c6922ab97662eedcfe8367f7f4ab61f0e0bbbe9d1da0f48f
Size: 19.17 MB - kernel-rt-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: c5220ea292b54ad2fbd91b0d784b7364
SHA-256: 2e8e25c1610a3220da0eaaa96f01d1613b0a0c1ad4aee0c4bec0f4c6723a02f0
Size: 21.74 MB - kernel-rt-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 601e0a7c064a85815511cfce65ae7a83
SHA-256: 6f6bf9c408fe19ec615e9a20d86642b2ae3ebac84088db38f2868b8ed7d05c75
Size: 40.36 MB - kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 230d4033d2e382256e2c990ccd4a7c0a
SHA-256: 8f88206d0af0855ad81544e101148af1cd281a4599c6f2a5d198e1458150b25b
Size: 31.31 MB - kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: fc864229dfea89882e070958234db4dd
SHA-256: cd07db42de8aa4cd01281640f9dd9816d9602667faa20aea199e38817ab85fc9
Size: 2.24 MB - kernel-rt-devel-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: b117e3deeb8ccdc575be2ec3f1531f12
SHA-256: 88698af76b583c6e3a42c3ab63cb8aa2ec0b486c5562a1e5e536dd22327dbc9f
Size: 21.60 MB - kernel-rt-modules-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 4a806ba06da902b41876891ff2b56ef2
SHA-256: c65c2244c814752fba16d1b1496760bafafd7dee16c030c491644d464e5b0f54
Size: 38.97 MB - kernel-rt-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: e95c8db2b92c7da1746baa4a0c11cdb3
SHA-256: 47486acff5945078c2dc8f79ef9a8959c5fa42bd6247291c1e60a5efd9f9b28e
Size: 30.27 MB - kernel-rt-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 0b8e9ee701014e626fcc50813cd30313
SHA-256: c10c496febf4062771dd55f02a4dc414634e6bc6cf807b1a4de8dde46814383a
Size: 2.22 MB - kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: a7124b32230471dc5c94a406aa6f177c
SHA-256: c8465e84f671d426d96f97a2eed295e80bf0ba2501e55db3c4cb91bc1b7c910d
Size: 2.07 MB - kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 688a7d9b6e5089872ee12d45e9df55d4
SHA-256: e820fa5bec77f853987990738c457dba622d3c54e1a9e75a936e1a1a9442633e
Size: 1.80 MB - kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: f6376473c45de72e6018f30d27f55e4d
SHA-256: 746815ef876a2ac4c6f702d2ec4467c629d1b2d28a35a660f38f2aea705862c1
Size: 1.79 MB - kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: a31a92c6843da4745f375384ea924084
SHA-256: fc87e7c155f52296680cc235ec7429b02ef49095f5377b3096e9184b4be9503b
Size: 63.01 MB - kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: b0d86bec7ab866edad70881dc13eb5a4
SHA-256: f3265ea1080bd45a6fe0a0c5812b296328fb75c2fcc40e4fa260a523a34fd551
Size: 1.81 MB - libperf-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 8a94c3808b75d6883f68a74a3580234f
SHA-256: f9ab033b5659ca096303a21e0f6a065adde1c6df1ffaacc53adb0a630686ec0b
Size: 1.81 MB - perf-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 455dbcb46c046e1703bfaf984ac3fe55
SHA-256: a53c2ccf0e6680b644adf636e3fc3a8be7ed3a0de9e2b77095f8a1b51b4c8e2e
Size: 4.02 MB - python3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 3b65b7649c9a3117c5bfd32a6aff4a0c
SHA-256: ce4aeb4d9a23fe48c9377ad3ba094ccadfe96dc1f411b6daaf7ffa1e9d71414b
Size: 3.20 MB - rtla-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: 56fb99d79e16f5610699e8be53bd2151
SHA-256: b24dde5d89a2e7dc1c3a43865c31c257e2da8ae152553e7d68fe2e22c94a6980
Size: 1.85 MB - rv-5.14.0-570.35.1.el9_6.x86_64.rpm
MD5: c7ff9ecc9da1c1e438847f1f7c496425
SHA-256: 539dd60c3eebb0edd118fa9c005d61f1a5ed93bfa138a88e31ce58e776071fb5
Size: 1.81 MB