kernel-4.18.0-553.71.1.el8_10

エラータID: AXSA:2025-10809:62

Release date: 
Tuesday, September 2, 2025 - 13:45
Subject: 
kernel-4.18.0-553.71.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-22058
In the Linux kernel, the following vulnerability has been resolved: udp: Fix memory accounting leak. Matt Dowling reported a weird UDP memory usage issue. Under normal operation, the UDP memory usage reported in /proc/net/sockstat remains close to zero. However, it occasionally spiked to 524,288 pages and never dropped. Moreover, the value doubled when the application was terminated. Finally, it caused intermittent packet drops. We can reproduce the issue with the script below [0]: 1. /proc/net/sockstat reports 0 pages # cat /proc/net/sockstat | grep UDP: UDP: inuse 1 mem 0 2. Run the script till the report reaches 524,288 # python3 test.py & sleep 5 # cat /proc/net/sockstat | grep UDP: UDP: inuse 3 mem 524288 <-- (INT_MAX + 1) >> PAGE_SHIFT 3. Kill the socket and confirm the number never drops # pkill python3 && sleep 5 # cat /proc/net/sockstat | grep UDP: UDP: inuse 1 mem 524288 4. (necessary since v6.0) Trigger proto_memory_pcpu_drain() # python3 test.py & sleep 1 && pkill python3 5. The number doubles # cat /proc/net/sockstat | grep UDP: UDP: inuse 1 mem 1048577 The application set INT_MAX to SO_RCVBUF, which triggered an integer overflow in udp_rmem_release(). When a socket is close()d, udp_destruct_common() purges its receive queue and sums up skb->truesize in the queue. This total is calculated and stored in a local unsigned integer variable. The total size is then passed to udp_rmem_release() to adjust memory accounting. However, because the function takes a signed integer argument, the total size can wrap around, causing an overflow. Then, the released amount is calculated as follows: 1) Add size to sk->sk_forward_alloc. 2) Round down sk->sk_forward_alloc to the nearest lower multiple of PAGE_SIZE and assign it to amount. 3) Subtract amount from sk->sk_forward_alloc. 4) Pass amount >> PAGE_SHIFT to __sk_mem_reduce_allocated(). When the issue occurred, the total in udp_destruct_common() was 2147484480 (INT_MAX + 833), which was cast to -2147482816 in udp_rmem_release(). At 1) sk->sk_forward_alloc is changed from 3264 to -2147479552, and 2) sets -2147479552 to amount. 3) reverts the wraparound, so we don't see a warning in inet_sock_destruct(). However, udp_memory_allocated ends up doubling at 4). Since commit 3cd3399dd7a8 ("net: implement per-cpu reserves for memory_allocated"), memory usage no longer doubles immediately after a socket is close()d because __sk_mem_reduce_allocated() caches the amount in udp_memory_per_cpu_fw_alloc. However, the next time a UDP socket receives a packet, the subtraction takes effect, causing UDP memory usage to double. This issue makes further memory allocation fail once the socket's sk->sk_rmem_alloc exceeds net.ipv4.udp_rmem_min, resulting in packet drops. To prevent this issue, let's use unsigned int for the calculation and call sk_forward_alloc_add() only once for the small delta. Note that first_packet_length() also potentially has the same problem. [0]: from socket import * SO_RCVBUFFORCE = 33 INT_MAX = (2 ** 31) - 1 s = socket(AF_INET, SOCK_DGRAM) s.bind(('', 0)) s.setsockopt(SOL_SOCKET, SO_RCVBUFFORCE, INT_MAX) c = socket(AF_INET, SOCK_DGRAM) c.connect(s.getsockname()) data = b'a' * 100 while True: c.send(data)
CVE-2025-38200
In the Linux kernel, the following vulnerability has been resolved: i40e: fix MMIO write access to an invalid page in i40e_clear_hw When the device sends a specific input, an integer underflow can occur, leading to MMIO write access to an invalid page. Prevent the integer underflow by changing the type of related variables.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.71.1.el8_10.src.rpm
    MD5: 3707b53cafdc4a8789cc5247869928ab
    SHA-256: 663fbc654149c31b448eed095bed3ca483f6ddf7f79d333503789e74bf02260b
    Size: 132.25 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 32cd385561e9870455df3a415a7526ad
    SHA-256: caa4b383c7871029ccf46aff364f9b25b26d378b24688b93f7c760eae09a31f5
    Size: 11.23 MB
  2. kernel-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 000f27523da47e2ba3ad96b91eca327e
    SHA-256: c2307162ef0d3df982b4b1403d67ceceb6bfaeba9fd17b86cc422e049f2de0ab
    Size: 10.50 MB
  3. kernel-abi-stablelists-4.18.0-553.71.1.el8_10.noarch.rpm
    MD5: 570df0b87fb5a36085103dada77f1bf2
    SHA-256: a7650d23578de8fbe1198f0923f1433182af6feefc7ad70e1a6634898a78aed1
    Size: 10.52 MB
  4. kernel-core-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 312739db8d10a7245e953e48a7ad9a2e
    SHA-256: 87f3976887a36cd965db062dd390babb443987683dffa7de4e3d17b7af130fe1
    Size: 43.54 MB
  5. kernel-cross-headers-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 0ac276cc8732e3644f912879b0d505aa
    SHA-256: 01d2f5bb3b1828568c2a838589f8b6fb7598ade506e248ccaff383fd780c415b
    Size: 15.85 MB
  6. kernel-debug-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 0345651023d8208d17f0e73ebf48d60e
    SHA-256: 76a605c94dc7ffcaa40c2c9543a369cca62bcdadca9872ef305a5254851a98bb
    Size: 10.50 MB
  7. kernel-debug-core-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: cc98f7684f9822bc319d8c85de2c9483
    SHA-256: 0a4f1255994e559f7839864e99ab3067171e8433c117402f6aa873e492c57d0e
    Size: 72.83 MB
  8. kernel-debug-devel-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 8bb248905074fe34e237af1be9e3bdb8
    SHA-256: ee4952491e2215680d384536feda2e40c70e51e09429e591fc895b8afa2667e5
    Size: 24.34 MB
  9. kernel-debug-modules-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 542dd461f32740b21056251eb9658a26
    SHA-256: c02bb5da7ec1dbc0bbb97e4b21162b904b3db3f18f444d1f1f9da1b18cd5216d
    Size: 65.92 MB
  10. kernel-debug-modules-extra-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: ad11e462447f6db88c1b643cc46ea68f
    SHA-256: acb1ccc5a74baaec4931ece05f456674b03332413e39587cd280e6efdf1996fb
    Size: 11.88 MB
  11. kernel-devel-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 4448be831fcd1e7ec384cabf442eac6e
    SHA-256: b2213e249021bb123da36d9470685eb7320c5a037b5c571932d863c3da0f5628
    Size: 24.14 MB
  12. kernel-doc-4.18.0-553.71.1.el8_10.noarch.rpm
    MD5: d9b4c01271721164f9793a606667d975
    SHA-256: ca8289d2d32539e1fe567861a3dc114efad83baae97e5e27e401a90935afffd8
    Size: 28.37 MB
  13. kernel-headers-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: c4be3297c95d43de8aa7d13c6e678931
    SHA-256: 496242f57c5029ebd3ad8c5ea1e3e701bf8ed90b1d40b3165d4cb46b779cfb21
    Size: 11.86 MB
  14. kernel-modules-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 182e0e865c3af89a0981e148488bc651
    SHA-256: b28958d263714a3218fbb8658aa3a4a60f270ed2bf3dfbb88f3bd08fc1afed1e
    Size: 36.31 MB
  15. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 61a58afaf8202c2dd454c535e60dc325
    SHA-256: d2b2386bfb8265af4aff0a79a2f99a44937870ce12bc976205457827c5823b91
    Size: 11.19 MB
  16. kernel-tools-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 8c92a613ddf4cbd0b67ed6cdbe8bf447
    SHA-256: af5ca4df8250e248112a59840192a5c3f1b0ffa2bd1cc5fdd5c28e04fbb9dfed
    Size: 10.72 MB
  17. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 652c8c36806b7c6d39a9ca9b04b30f5f
    SHA-256: 5f8815ebf05ecb8a8d0ca6c5e752b04dc36a811113720880994accd35df3792f
    Size: 10.51 MB
  18. kernel-tools-libs-devel-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 50408e0ea25379669cc0502e87c20088
    SHA-256: 774ddb0447d7669fd5c85abef9713cacbb7796909f22cdd3d8aa5027a57727c8
    Size: 10.51 MB
  19. perf-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 809256315edaea11e19f4d132a58496a
    SHA-256: 4ef2141625893f8d72a106f6b0ad98ad1436ced430d26557e2294baad8348a3d
    Size: 12.82 MB
  20. python3-perf-4.18.0-553.71.1.el8_10.x86_64.rpm
    MD5: 1ee561e7d5b7afed946b5f9e59d5e135
    SHA-256: fd1d5ddb64fb85af680b0e78eff5154ae95144321d54cb776622420f5bba3414
    Size: 10.63 MB