kernel-4.18.0-553.75.1.el8_10

エラータID: AXSA:2025-10889:70

Release date: 
Wednesday, September 24, 2025 - 17:31
Subject: 
kernel-4.18.0-553.75.1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net: usb: smsc75xx: Limit packet length to skb->len (CVE-2023-53125)
* kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
* kernel: idpf: convert control queue mutex to a spinlock (CVE-2025-38392)
* kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-53125
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned skb passed up the network stack will leak kernel memory contents.
CVE-2025-38350
In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain classful qdiscs may invoke their classes' dequeue handler on an enqueue operation. This may unexpectedly empty the child qdisc and thus make an in-flight class passive via qlen_notify(). Most qdiscs do not expect such behaviour at this point in time and may re-activate the class eventually anyways which will lead to a use-after-free. The referenced fix commit attempted to fix this behavior for the HFSC case by moving the backlog accounting around, though this turned out to be incomplete since the parent's parent may run into the issue too. The following reproducer demonstrates this use-after-free: tc qdisc add dev lo root handle 1: drr tc filter add dev lo parent 1: basic classid 1:1 tc class add dev lo parent 1: classid 1:1 drr tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1 tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0 tc qdisc add dev lo parent 2:1 handle 3: netem tc qdisc add dev lo parent 3:1 handle 4: blackhole echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888 tc class delete dev lo classid 1:1 echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888 Since backlog accounting issues leading to a use-after-frees on stale class pointers is a recurring pattern at this point, this patch takes a different approach. Instead of trying to fix the accounting, the patch ensures that qdisc_tree_reduce_backlog always calls qlen_notify when the child qdisc is empty. This solves the problem because deletion of qdiscs always involves a call to qdisc_reset() and / or qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing the following qdisc_tree_reduce_backlog() to report to the parent. Note that this may call qlen_notify on passive classes multiple times. This is not a problem after the recent patch series that made all the classful qdiscs qlen_notify() handlers idempotent.
CVE-2025-38392
In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50FCP2SBSTD, BIOS SE5C741.86B.01.01.0001.2211140926 11/14/2022 [ 324.701774] Call Trace: [ 324.701777] [ 324.701779] dump_stack_lvl+0x5d/0x80 [ 324.701788] ? __dev_open+0x3dd/0x870 [ 324.701793] __might_resched.cold+0x1ef/0x23d <..> [ 324.701818] __mutex_lock+0x113/0x1b80 <..> [ 324.701917] idpf_ctlq_clean_sq+0xad/0x4b0 [idpf] [ 324.701935] ? kasan_save_track+0x14/0x30 [ 324.701941] idpf_mb_clean+0x143/0x380 [idpf] <..> [ 324.701991] idpf_send_mb_msg+0x111/0x720 [idpf] [ 324.702009] idpf_vc_xn_exec+0x4cc/0x990 [idpf] [ 324.702021] ? rcu_is_watching+0x12/0xc0 [ 324.702035] idpf_add_del_mac_filters+0x3ed/0xb50 [idpf] <..> [ 324.702122] __hw_addr_sync_dev+0x1cf/0x300 [ 324.702126] ? find_held_lock+0x32/0x90 [ 324.702134] idpf_set_rx_mode+0x317/0x390 [idpf] [ 324.702152] __dev_open+0x3f8/0x870 [ 324.702159] ? __pfx___dev_open+0x10/0x10 [ 324.702174] __dev_change_flags+0x443/0x650 <..> [ 324.702208] netif_change_flags+0x80/0x160 [ 324.702218] do_setlink.isra.0+0x16a0/0x3960 <..> [ 324.702349] rtnl_newlink+0x12fd/0x21e0 The sequence is as follows: rtnl_newlink()-> __dev_change_flags()-> __dev_open()-> dev_set_rx_mode() - > # disables BH and grabs "dev->addr_list_lock" idpf_set_rx_mode() -> # proceed only if VIRTCHNL2_CAP_MACFILTER is ON __dev_uc_sync() -> idpf_add_mac_filter -> idpf_add_del_mac_filters -> idpf_send_mb_msg() -> idpf_mb_clean() -> idpf_ctlq_clean_sq() # mutex_lock(cq_lock) Fix by converting cq_lock to a spinlock. All operations under the new lock are safe except freeing the DMA memory, which may use vunmap(). Fix by requesting a contiguous physical memory for the DMA mapping.
CVE-2025-38449
In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be released while the GEM buffer object is attached to a DRM framebuffer. This leads to the release of the dma-buf backing the buffer object, if any. [1] Trying to use the framebuffer in further mode-setting operations leads to a segmentation fault. Most easily happens with driver that use shadow planes for vmap-ing the dma-buf during a page flip. An example is shown below. [ 156.791968] ------------[ cut here ]------------ [ 156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430 [...] [ 156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430 [ 157.043420] Call Trace: [ 157.045898] [ 157.048030] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.052436] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.056836] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.061253] ? drm_gem_shmem_vmap+0x74/0x710 [ 157.065567] ? dma_buf_vmap+0x224/0x430 [ 157.069446] ? __warn.cold+0x58/0xe4 [ 157.073061] ? dma_buf_vmap+0x224/0x430 [ 157.077111] ? report_bug+0x1dd/0x390 [ 157.080842] ? handle_bug+0x5e/0xa0 [ 157.084389] ? exc_invalid_op+0x14/0x50 [ 157.088291] ? asm_exc_invalid_op+0x16/0x20 [ 157.092548] ? dma_buf_vmap+0x224/0x430 [ 157.096663] ? dma_resv_get_singleton+0x6d/0x230 [ 157.101341] ? __pfx_dma_buf_vmap+0x10/0x10 [ 157.105588] ? __pfx_dma_resv_get_singleton+0x10/0x10 [ 157.110697] drm_gem_shmem_vmap+0x74/0x710 [ 157.114866] drm_gem_vmap+0xa9/0x1b0 [ 157.118763] drm_gem_vmap_unlocked+0x46/0xa0 [ 157.123086] drm_gem_fb_vmap+0xab/0x300 [ 157.126979] drm_atomic_helper_prepare_planes.part.0+0x487/0xb10 [ 157.133032] ? lockdep_init_map_type+0x19d/0x880 [ 157.137701] drm_atomic_helper_commit+0x13d/0x2e0 [ 157.142671] ? drm_atomic_nonblocking_commit+0xa0/0x180 [ 157.147988] drm_mode_atomic_ioctl+0x766/0xe40 [...] [ 157.346424] ---[ end trace 0000000000000000 ]--- Acquiring GEM handles for the framebuffer's GEM buffer objects prevents this from happening. The framebuffer's cleanup later puts the handle references. Commit 1a148af06000 ("drm/gem-shmem: Use dma_buf from GEM object instance") triggers the segmentation fault easily by using the dma-buf field more widely. The underlying issue with reference counting has been present before. v2: - acquire the handle instead of the BO (Christian) - fix comment style (Christian) - drop the Fixes tag (Christian) - rename err_ gotos - add missing Link tag

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-553.75.1.el8_10.src.rpm
    MD5: 134605d7d37e853c14638e4b9d632b39
    SHA-256: e0408954e727ee1be30029b80d8e4495377304bbb934bd8edc26cc52278d379f
    Size: 132.27 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 9108a93f81951ffcb12eb4112028789c
    SHA-256: 911828039621550fe86f780070ee8724be6a94a9f2cb0ff7010413e803cf8a04
    Size: 11.24 MB
  2. kernel-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: eb08be116e5a0a129b16400343d3581e
    SHA-256: 7ae8db96598c4a657919cfc6431ce88953b590a420a653d6de100e60e54226c8
    Size: 10.51 MB
  3. kernel-abi-stablelists-4.18.0-553.75.1.el8_10.noarch.rpm
    MD5: ff0b6b543efd1313c23fdbc90efc3dee
    SHA-256: 9d0330a95a355bb6bdc4c7adc55278f7187718308b27a344c00f2f46a715b096
    Size: 10.53 MB
  4. kernel-core-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 542350e535681b5093df45789fcfaab8
    SHA-256: 07793652c2b13c361a845257d6096eda767f6214265bf5067e2e91954231c84f
    Size: 43.54 MB
  5. kernel-cross-headers-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: ffc9020112de16bb0dc23ffa9714264b
    SHA-256: f7e9b02238b64798d793005b2698c09ca9f145acda0fc66c2224e25bc3ca34c0
    Size: 15.86 MB
  6. kernel-debug-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 37541ac2445e4cdff2f91f3f570f2d27
    SHA-256: c8862bf49cdc857dc345bc9df244cf1c246dc7e457a5424d143fdc190ea452e9
    Size: 10.51 MB
  7. kernel-debug-core-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: e2b7ed9f77fab21ae433130fff8b3d07
    SHA-256: 6aba8117ba960d3b7e97b74870a3b678f883e3b8924ea403e1cbb24eed66995c
    Size: 72.84 MB
  8. kernel-debug-devel-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 4232d6668e9ebe7cfbc420ea485aa882
    SHA-256: 683d0c030cc003abb7d5faad2e8bf9f8245faa1226495bbb2a3b5883228dd877
    Size: 24.35 MB
  9. kernel-debug-modules-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 98854c8f2347e28f47917bcd95338246
    SHA-256: 380ff5d9669c6124fc689eee37fec2ebdf7fcf56b4a61c5f6afc648750d54203
    Size: 65.91 MB
  10. kernel-debug-modules-extra-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: b5143c27d37da8767eeaa4364ad3cf46
    SHA-256: 6d98abf5380117a50761f1d031054388c92e76f0b1c97cf23bd2589c6e5e3087
    Size: 11.89 MB
  11. kernel-devel-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: fe41e94c1b614c1f66f0a8a2fe6a39d8
    SHA-256: 4a6d1db1cf2140fb80ddfc1b19090069545b9241413a8f2fd009dab517323b36
    Size: 24.14 MB
  12. kernel-doc-4.18.0-553.75.1.el8_10.noarch.rpm
    MD5: 59061a47df649d7eb5e509d428a31d2e
    SHA-256: cf985ee976e714e7476a50afefec585f429dff4643cb3f06ce460099ad6c161b
    Size: 28.37 MB
  13. kernel-headers-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 78fd470d3ed12fae7332740e93fcaadf
    SHA-256: 8e1a94b63bec4f63a1a7aa6a7b60101678321432b937fa28b70d58c3d1c1ff6d
    Size: 11.86 MB
  14. kernel-modules-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 151a4916873fa62e0601751fbb924609
    SHA-256: c4a41879ed019df4d2faf531252ff120958c53ed578d86c78ee0a1837014fc02
    Size: 36.32 MB
  15. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: fb7255549f4d6d86ad56d1e43fa3a1ea
    SHA-256: d6188ecccd205f3355fe94d754636d7c4efca1e7581ce0f9d07d3f821b98b50e
    Size: 11.20 MB
  16. kernel-tools-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 82bfe6fcf0f93f97feceb08591f753a9
    SHA-256: 164e5cc23e2cb1b079b0707a11ee547efc0eb44b94f126ea43c5b86db28caef3
    Size: 10.73 MB
  17. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 053d06a71fefcb56285d33a2a69eb791
    SHA-256: 8ae168a4e4468acc941019be153302329aed069af50c961f18cf1b7c1cfc683f
    Size: 10.52 MB
  18. kernel-tools-libs-devel-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 9cf6b3126ad41717bb35b562bee38976
    SHA-256: 84f5bc5fbc0ae93e2a32680637caf3c150920281a8bd65c00e4eee4858294b81
    Size: 10.51 MB
  19. perf-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: a4f7911cb98de67854f412f50b04a597
    SHA-256: fdc0924f812b95047fd1ac685cb1da8952060f8fce7e18b1884dbf3e2414508b
    Size: 12.83 MB
  20. python3-perf-4.18.0-553.75.1.el8_10.x86_64.rpm
    MD5: 9de99d7be1ed9c6c7449ba94d580ed13
    SHA-256: ae225c177e3b11d8728272bec59d810d0c20eae80477daac755b50673081f689
    Size: 10.64 MB