kernel-5.14.0-611.20.1.el9_7

エラータID: AXSA:2026-069:03

Release date: 
Thursday, January 22, 2026 - 17:58
Subject: 
kernel-5.14.0-611.20.1.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (CVE-2025-39806)
* kernel: audit: fix out-of-bounds read in audit_compare_dname_path() (CVE-2025-39840)
* kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)
* kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-39806
In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() A malicious HID device can trigger a slab out-of-bounds during mt_report_fixup() by passing in report descriptor smaller than 607 bytes. mt_report_fixup() attempts to patch byte offset 607 of the descriptor with 0x25 by first checking if byte offset 607 is 0x15 however it lacks bounds checks to verify if the descriptor is big enough before conducting this check. Fix this bug by ensuring the descriptor size is at least 608 bytes before accessing it. Below is the KASAN splat after the out of bounds access happens: [ 13.671954] ================================================================== [ 13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110 [ 13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10 [ 13.673297] [ 13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83f4-dirty #3 [ 13.673297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/04 [ 13.673297] Call Trace: [ 13.673297] [ 13.673297] dump_stack_lvl+0x5f/0x80 [ 13.673297] print_report+0xd1/0x660 [ 13.673297] kasan_report+0xe5/0x120 [ 13.673297] __asan_report_load1_noabort+0x18/0x20 [ 13.673297] mt_report_fixup+0x103/0x110 [ 13.673297] hid_open_report+0x1ef/0x810 [ 13.673297] mt_probe+0x422/0x960 [ 13.673297] hid_device_probe+0x2e2/0x6f0 [ 13.673297] really_probe+0x1c6/0x6b0 [ 13.673297] __driver_probe_device+0x24f/0x310 [ 13.673297] driver_probe_device+0x4e/0x220 [ 13.673297] __device_attach_driver+0x169/0x320 [ 13.673297] bus_for_each_drv+0x11d/0x1b0 [ 13.673297] __device_attach+0x1b8/0x3e0 [ 13.673297] device_initial_probe+0x12/0x20 [ 13.673297] bus_probe_device+0x13d/0x180 [ 13.673297] device_add+0xe3a/0x1670 [ 13.673297] hid_add_device+0x31d/0xa40 [...]
CVE-2025-39840
In the Linux kernel, the following vulnerability has been resolved: audit: fix out-of-bounds read in audit_compare_dname_path() When a watch on dir=/ is combined with an fsnotify event for a single-character name directly under / (e.g., creating /a), an out-of-bounds read can occur in audit_compare_dname_path(). The helper parent_len() returns 1 for "/". In audit_compare_dname_path(), when parentlen equals the full path length (1), the code sets p = path + 1 and pathlen = 1 - 1 = 0. The subsequent loop then dereferences p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read. Fix this by adding a pathlen > 0 check to the while loop condition to prevent the out-of-bounds access. [PM: subject tweak, sign-off email fixes]
CVE-2025-39883
In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory When I did memory failure tests, below panic occurs: page dumped because: VM_BUG_ON_PAGE(PagePoisoned(page)) kernel BUG at include/linux/page-flags.h:616! Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 720 Comm: bash Not tainted 6.10.0-rc1-00195-g148743902568 #40 RIP: 0010:unpoison_memory+0x2f3/0x590 RSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246 RAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8 RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0 RBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb R10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000 R13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe FS: 00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0 Call Trace: unpoison_memory+0x2f3/0x590 simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110 debugfs_attr_write+0x42/0x60 full_proxy_write+0x5b/0x80 vfs_write+0xd5/0x540 ksys_write+0x64/0xe0 do_syscall_64+0xb9/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f08f0314887 RSP: 002b:00007ffece710078 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f08f0314887 RDX: 0000000000000009 RSI: 0000564787a30410 RDI: 0000000000000001 RBP: 0000564787a30410 R08: 000000000000fefe R09: 000000007fffffff R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 R13: 00007f08f041b780 R14: 00007f08f0417600 R15: 00007f08f0416a00 Modules linked in: hwpoison_inject ---[ end trace 0000000000000000 ]--- RIP: 0010:unpoison_memory+0x2f3/0x590 RSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246 RAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8 RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0 RBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb R10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000 R13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe FS: 00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0 Kernel panic - not syncing: Fatal exception Kernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) ---[ end Kernel panic - not syncing: Fatal exception ]--- The root cause is that unpoison_memory() tries to check the PG_HWPoison flags of an uninitialized page. So VM_BUG_ON_PAGE(PagePoisoned(page)) is triggered. This can be reproduced by below steps: 1.Offline memory block: echo offline > /sys/devices/system/memory/memory12/state 2.Get offlined memory pfn: page-types -b n -rlN 3.Write pfn to unpoison-pfn echo > /sys/kernel/debug/hwpoison/unpoison-pfn This scenario can be identified by pfn_to_online_page() returning NULL. And ZONE_DEVICE pages are never expected, so we can simply fail if pfn_to_online_page() == NULL to fix the bug.
CVE-2025-40240
In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only. chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sure that otherwise chunk->skb is non-NULL because of outer if() condition.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-611.20.1.el9_7.src.rpm
    MD5: fa9d6d6582594ceed3a9666d6846b172
    SHA-256: 878aa7d2ecfee14572627e3d954d54ec0ff209290a783e3a500a552747ca6522
    Size: 143.99 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 85b9aff3b8c2a67d76aaf2e253cdf2c2
    SHA-256: 94ec2bcf65d2871240c9cbcf800254ea687607cf3613e7df17ca8bbc3574c8ad
    Size: 1.09 MB
  2. kernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm
    MD5: 8dfecfacc3313d05d53fc12d60ffaab2
    SHA-256: 37a2ad70d093ccacb13c0a1271cd83757534fcd5e96c54569160c170e889ef06
    Size: 1.12 MB
  3. kernel-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 552854da9004e9f21d98bb216392f20c
    SHA-256: 51585f17a95e05509b112bbfe4456884612b9aeae13c4e9f5bfe6c9c5ec66152
    Size: 17.37 MB
  4. kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: c442151d695409655922997f5ba9f94e
    SHA-256: f089d1892738bf03a1f097b87bd122d99ea790c82647c1261a0657cb3ed6aa13
    Size: 8.04 MB
  5. kernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: cd3e6a08724ae80b3a7d25df553ce18e
    SHA-256: 9df98e00e8f3197dda61697c52e8bff21923b57a34d266375d7a6b502e4826c2
    Size: 1.09 MB
  6. kernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 5ebaaf1150796b6c6f3e11f0597c7a05
    SHA-256: 8051e2bb173ce25077919a10ee0081cb1c6f745fc5f29a359720a0757b7879d0
    Size: 30.95 MB
  7. kernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 80aa61c75d68a8fca4533cfd83cef528
    SHA-256: dd9748a6d61046876cb4833375495f848ea5c77ee55d8160f5ac89f051ce37fc
    Size: 21.28 MB
  8. kernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: e273ce4d62a9089fde63281acb3957dc
    SHA-256: 369ac767ca2838fc0c0bd07fab1ccc9ec43cee289a2566f2820ede69ad5b6439
    Size: 1.09 MB
  9. kernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 78c0c236c13b938bf4360fb4b95bd27f
    SHA-256: 0e0f25f313c152e006ecb49fb11d5ed8448ddd9e4d37e2b42996bc882ad696b4
    Size: 69.32 MB
  10. kernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 6993d57aaa1f276315e2f4b154a45b6b
    SHA-256: 88135658eca20a53675b0a160f67e460eeb5ff8c0969fedc37e5a8fe97544a82
    Size: 49.51 MB
  11. kernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: f7b1a14db9b640575574247574ba8604
    SHA-256: 55881d51e6c43db51ef8a266278b936e74339e07c28c0ffb9061f6c2cc4b1e46
    Size: 1.87 MB
  12. kernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: ad7dd2858d0202136036a1c9afb74ae1
    SHA-256: a3d8e1540a696eea27c3ae48af5af39126c61ebc57d46d04dd355e1b4efc5ddb
    Size: 85.81 MB
  13. kernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 15a736b586dfbe19ef07f27d9b135510
    SHA-256: 30b7fa67af8878f5991fc456685d71f722f277effafc61fb52edd3ef68902671
    Size: 21.11 MB
  14. kernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 76030116eb33760dd20084d85d8b1920
    SHA-256: a95d92e42334b0c72623adae4d1d1ddd8629a12ff197628e139f1b10b695b62e
    Size: 1.09 MB
  15. kernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm
    MD5: ff34785642b7623880bb9a8c2cae4d01
    SHA-256: e41139ff32f452d5f3e442a7f9208afcf898f7b8f9a868bbdaee445b0f99f5ef
    Size: 38.84 MB
  16. kernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 6f181d6b0c1b29529fa8c9a87e9efd57
    SHA-256: 70151a09ac85eb4973eeef66891842980eafef394b892d51d98dd8e999b7fa07
    Size: 2.85 MB
  17. kernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: af6992d549d13e5390cd6c68cadf89c7
    SHA-256: 2057e2509d3bb11ff6382ad88380ab53c87fcffb32ba83ebccea0a734ce3441d
    Size: 39.76 MB
  18. kernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 3fdc5b819a39c04e76346935df806e61
    SHA-256: b12de2c4b9f4af8a96cdc9a221e051b2e0b8f746180b8ab943c46b2323f0fc45
    Size: 30.96 MB
  19. kernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 4f7dee9adf6d42606eb3f46bc5b2e344
    SHA-256: 06501879f3d6043a3fb6605f3af477cdc72a281d391b1c4a6577940c4aa10793
    Size: 1.52 MB
  20. kernel-rt-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 192fc7933f6a68eef90951e84dbec9fa
    SHA-256: b53ecbb348ebba8761aca70cc1cf4e1202d56aa4b6a8958f1c2f53385a99d23c
    Size: 1.09 MB
  21. kernel-rt-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 832069754024889dae79d291b9b19a68
    SHA-256: cbefaf43f28bc2f0bbf0db604ad40577a3b9e7d75db9248ae0561f77fe7d0162
    Size: 17.28 MB
  22. kernel-rt-debug-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 9822199d7c0c53f06198e307cb319501
    SHA-256: 6afa0cb093e2bc1cf6eff947deac51b56d1a2f15315b3599a1545379cbd7e66e
    Size: 1.09 MB
  23. kernel-rt-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 2053df6bced1b4bebaa827ea5356c2a6
    SHA-256: ced07977db374780051dd3a14ebebd1614d9b4f90ffeb24a32430c8223d9cecf
    Size: 18.70 MB
  24. kernel-rt-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 352a517e7fe59f7a496eedf1d9364358
    SHA-256: f1a658c01d6123a1f0644c4eb97a505743f31729e3205f5f542cb16306879075
    Size: 21.23 MB
  25. kernel-rt-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: ef6a1291f1b4f4582462e162fcf8be43
    SHA-256: b45f027c775c51e7ff1d10fe28684c6fb10aa588d7762ed13ce897e32aca0e9b
    Size: 41.31 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 1c05e74a5a97df8c5e7cb26503e049f6
    SHA-256: 33a744cc2a15d3ce83223afc6ec45b498a9042250565a805904dd52ada4caee8
    Size: 32.14 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: b23b8bfda1007c5849ddb4c70d723e5d
    SHA-256: 12ae1331624a8e0deeb9f2410861f5466f195209aec8a0ce9339b73514728db8
    Size: 1.54 MB
  28. kernel-rt-devel-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 44038911306ce8e240dd1523b17e5eb0
    SHA-256: 4d1e33d16c8996a1248cc89a863a5d41cc88203dcb6984a693db6cece423b575
    Size: 21.10 MB
  29. kernel-rt-modules-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: c3087d3a1c3e7772aa207a19e80a4f74
    SHA-256: 8887e8d48ca439805397078c9ab37517acbebd6eddacda8ebeb85d1c806b59a9
    Size: 39.80 MB
  30. kernel-rt-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 6eef710954ba89c282c970e8b28745a4
    SHA-256: f88151c4d7f50062a62d9aa62dce9c7fb6e0732f5669a9cd691b70235fe02536
    Size: 31.04 MB
  31. kernel-rt-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 600ee9464076bf164345fdd8d10638d3
    SHA-256: 3226737074fd0c634e34d32f049adc1a8b7101105a93034a35166f5f23c017ca
    Size: 1.52 MB
  32. kernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: d97d2d0ff353ff30a626721b12785fd7
    SHA-256: 61a850c8aeea630fe463d74bbf9fde6240bd72f8733d89b88b0cf767201e5b04
    Size: 1.38 MB
  33. kernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 2b12992198b4ef3dee25373644a1e0b1
    SHA-256: d0fd38c7f187a638fd944018141bdaef0e6c2ec6210b9a88fcb8c9c4e2accbeb
    Size: 1.11 MB
  34. kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 91e7639ce05bc2881f0b6fe58b7bdd97
    SHA-256: 6d7744f708572c569f7a492998d82efd5b987d11ee39274467f8e6ca8459f79b
    Size: 1.10 MB
  35. kernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: b613f1d3535b5dfc1307234e40258547
    SHA-256: 650d1bc90bdd9e5a3854347103dafaea7ea32d44f75155eb8a05ad98399c233b
    Size: 63.95 MB
  36. kernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 6c4865e9ebb5d429c99af676d6ed11c8
    SHA-256: f08577665f9dfc98640d4d98660bbf816ec9ff530aec1b98a98c856602776ed8
    Size: 1.12 MB
  37. libperf-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 48a7cda11654c9d2faab53eec0c9a766
    SHA-256: ebd0b978e1741347427dc87a52244b9167e682261b3d933f1fccdc5fb5260245
    Size: 1.11 MB
  38. perf-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: ea6f6bab6d93c17b49080e53b6c494d3
    SHA-256: c085f98099ca025f671dcaa6aaff5c11e902d82cdc46db83ccd60e21f8e52f0e
    Size: 3.35 MB
  39. python3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: de15f7038f335b85470f842e6dc97a1b
    SHA-256: a2b26aec92f62dc1bb8fcd7a4f27a649260db74639283b3a548f7a44e387ce03
    Size: 2.52 MB
  40. rtla-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: ec203f2af6bb9c78d6d60088183b6d09
    SHA-256: 561bdbd44214131e87428cc6a88de66a02a416557e70679523c0334235215b37
    Size: 1.16 MB
  41. rv-5.14.0-611.20.1.el9_7.x86_64.rpm
    MD5: 4ca83cfefe4a34ee36f7d54c71c23a23
    SHA-256: 46137e3a9d7d1896161f53d86f96ad3256e336a40d3f6fb34efdbae2b2a67ac9
    Size: 1.11 MB