kernel-5.14.0-611.24.1.el9_7
エラータID: AXSA:2026-117:06
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: drm/xe: Make dma-fences compliant with the safe access rules (CVE-2025-38703)
* kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)
* kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)
* kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287)
* kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-38703
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock.
CVE-2025-39933
In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done verify data_offset, data_length and remaining_data_length This is inspired by the related server fixes.
CVE-2025-40277
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
CVE-2025-68285
In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70 Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305 CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266 ... Call Trace: have_mon_and_osd_map+0x56/0x70 ceph_open_session+0x182/0x290 ceph_get_tree+0x333/0x680 vfs_get_tree+0x49/0x180 do_new_mount+0x1a3/0x2d0 path_mount+0x6dd/0x730 do_mount+0x99/0xe0 __do_sys_mount+0x141/0x180 do_syscall_64+0x9f/0x100 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 13305: ceph_osdmap_alloc+0x16/0x130 ceph_osdc_init+0x27a/0x4c0 ceph_create_client+0x153/0x190 create_fs_client+0x50/0x2a0 ceph_get_tree+0xff/0x680 vfs_get_tree+0x49/0x180 do_new_mount+0x1a3/0x2d0 path_mount+0x6dd/0x730 do_mount+0x99/0xe0 __do_sys_mount+0x141/0x180 do_syscall_64+0x9f/0x100 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 9475: kfree+0x212/0x290 handle_one_map+0x23c/0x3b0 ceph_osdc_handle_map+0x3c9/0x590 mon_dispatch+0x655/0x6f0 ceph_con_process_message+0xc3/0xe0 ceph_con_v1_try_read+0x614/0x760 ceph_con_workfn+0x2de/0x650 process_one_work+0x486/0x7c0 process_scheduled_works+0x73/0x90 worker_thread+0x1c8/0x2a0 kthread+0x2ec/0x300 ret_from_fork+0x24/0x40 ret_from_fork_asm+0x1a/0x30 Rewrite the wait loop to check the above condition directly with client->monc.mutex and client->osdc.lock taken as appropriate. While at it, improve the timeout handling (previously mount_timeout could be exceeded in case wait_event_interruptible_timeout() slept more than once) and access client->auth_err under client->monc.mutex to match how it's set in finish_auth(). monmap_show() and osdmap_show() now take the respective lock before accessing the map as well.
CVE-2025-68287
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking `dwc3_remove_requests()`, leading to premature freeing of USB requests and subsequent crashes. Three distinct execution paths interact with `dwc3_remove_requests()`: Path 1: Triggered via `dwc3_gadget_reset_interrupt()` during USB reset handling. The call stack includes: - `dwc3_ep0_reset_state()` - `dwc3_ep0_stall_and_restart()` - `dwc3_ep0_out_start()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 2: Also initiated from `dwc3_gadget_reset_interrupt()`, but through `dwc3_stop_active_transfers()`. The call stack includes: - `dwc3_stop_active_transfers()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 3: Occurs independently during `adb root` execution, which triggers USB function unbind and bind operations. The sequence includes: - `gserial_disconnect()` - `usb_ep_disable()` - `dwc3_gadget_ep_disable()` - `dwc3_remove_requests()` with `-ESHUTDOWN` status Path 3 operates asynchronously and lacks synchronization with Paths 1 and 2. When Path 3 completes, it disables endpoints and frees 'out' requests. If Paths 1 or 2 are still processing these requests, accessing freed memory leads to a crash due to use-after-free conditions. To fix this added check for request completion and skip processing if already completed and added the request status for ep0 while queue.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock.
In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done verify data_offset, data_length and remaining_data_length This is inspired by the related server fixes.
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70 Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305 CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266 ... Call Trace:
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking `dwc3_remove_requests()`, leading to premature freeing of USB requests and subsequent crashes. Three distinct execution paths interact with `dwc3_remove_requests()`: Path 1: Triggered via `dwc3_gadget_reset_interrupt()` during USB reset handling. The call stack includes: - `dwc3_ep0_reset_state()` - `dwc3_ep0_stall_and_restart()` - `dwc3_ep0_out_start()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 2: Also initiated from `dwc3_gadget_reset_interrupt()`, but through `dwc3_stop_active_transfers()`. The call stack includes: - `dwc3_stop_active_transfers()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 3: Occurs independently during `adb root` execution, which triggers USB function unbind and bind operations. The sequence includes: - `gserial_disconnect()` - `usb_ep_disable()` - `dwc3_gadget_ep_disable()` - `dwc3_remove_requests()` with `-ESHUTDOWN` status Path 3 operates asynchronously and lacks synchronization with Paths 1 and 2. When Path 3 completes, it disables endpoints and frees 'out' requests. If Paths 1 or 2 are still processing these requests, accessing freed memory leads to a crash due to use-after-free conditions. To fix this added check for request completion and skip processing if already completed and added the request status for ep0 while queue.
N/A
SRPMS
- kernel-5.14.0-611.24.1.el9_7.src.rpm
MD5: 3a3b06d7f1ce320e09aaaca6051a6f2b
SHA-256: 83bfecf426d6740d263e8f2294b6ed3d538281637b55af0c4b8b02f42c013a6e
Size: 143.99 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 684837423ec95b97ba86a56a113cb4ad
SHA-256: c7408916e786e822b727ccb166c783a73f7b1f619b25015fa5acc3483d9e9d05
Size: 1.10 MB - kernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm
MD5: a84da3b40ca82a9f7816635802b3c3f3
SHA-256: 7893dfadc9205cc5fb5b3ca697a7a659d5a815c955d3a22526c469d14e51ef27
Size: 1.12 MB - kernel-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: a9a28fabc31fc5585c7628876074f44f
SHA-256: 0de5cdb5ffba77b5e5213db6774a05b788efa2399a941c3fe4bc28dc38fffaa3
Size: 17.37 MB - kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: d6e8cb02a3ce7c50222a17e5c5798b7f
SHA-256: 5fd493b014d537f31dd4f55870de4afe3e8ee79724c7a7e48a04360dfbed220b
Size: 8.04 MB - kernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: fd5e262f8263240e9f45e5e79ee7b0aa
SHA-256: 6751348588bf0d29dbde31109cbbe67d3382a0f0821e9ea3481f6ffe1b164bf0
Size: 1.10 MB - kernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 42892de827978fb2f8ac05fd3fb0a9af
SHA-256: 809c629f1beddaac5bad40fcb606c4f173514d442ad4525a44dbaa516c2baedf
Size: 30.95 MB - kernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: ff57d8ed222fc64e4ca6a3a61339d883
SHA-256: e7daf5e8d98467b633ddb16255eae90fe9082b1cf1221f21aeb91fbb6630521a
Size: 21.28 MB - kernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 5e63fe94fe5526b21d915890c0342180
SHA-256: 3c26bd3d86c41e385f74050a84ab3070cfc04f1e3c89f3f204a35986e861244e
Size: 1.10 MB - kernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 4fe2315bc0a88af337296436e2f6f46e
SHA-256: 46260a0c399d945e6dc3775e86e695a8c7c7c1b8c559ee621781e91fc3a88ce7
Size: 69.33 MB - kernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 860297a09b20b332f864d76f444136b4
SHA-256: eb74cfa7834b59e2f2e10e7a5f9b31aa4fbd0b09ab7fa27315d449774f2fee72
Size: 49.52 MB - kernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 8fb11ca75f91ad5bcc83c66c193b88b2
SHA-256: 1de3b44c39a3c1ab1579f9f9a5050b67c8b1124f769d7caa55119dcdd8c403eb
Size: 1.87 MB - kernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 2d640ec3f4934d730a07e6a1925c924f
SHA-256: a3e5eca68d26d9a690dbd6ce2386d44da50780a4a647fca918bf71a016716274
Size: 85.82 MB - kernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: c01193d86342832b846f3476007e70fc
SHA-256: 93acc6a0e36813a4568e7a122edd89f0d96f81935531d862fedc7fc110463e57
Size: 21.12 MB - kernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: edc374160219a02cfee21612a8c0e4a6
SHA-256: 614fce3d1644f2b1f7577a0d9ab5150f64839757f6ffb9e47e1c1c9680a2b8a5
Size: 1.10 MB - kernel-doc-5.14.0-611.24.1.el9_7.noarch.rpm
MD5: 68bf1f207cdb32668b070f3984759ce0
SHA-256: edc033f0758de7eccdfdc0a3a2075decfed8bde1bc040e864ebfd05060ac890c
Size: 38.84 MB - kernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: db236d9ca7e363d641761e0eb8ba5e8d
SHA-256: 296df27ec4f3f7c4b46bc52280f8160a61e323ebffe1817797f723d527c5f789
Size: 2.86 MB - kernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 8327a4618741ff1fe908c11bd837d29f
SHA-256: 1e625cff4057d1ee9d9e9ff4c00ae2889032763acb50894118e8f709dd4726a3
Size: 39.76 MB - kernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 2d28d7645ebf13bfdf6c6b518ff318d1
SHA-256: 874ecc3d227158f7b13f6847ecb17999578521f2b11369162def1196d8af6139
Size: 30.97 MB - kernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 4312f165331acb45c890a6f53cdece1a
SHA-256: 4c5529356b8209760b1efa43f723a85ded46f01180f1ded66fb0f6c69a48be72
Size: 1.52 MB - kernel-rt-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 5800c08a948be0fadd3ebf8ff476a43f
SHA-256: 92beedc7cc1f5a94d6c77b05c46124eba6c2f6388109986ddfe8cf50423c3f3c
Size: 1.10 MB - kernel-rt-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 0cbbf284ea968b08bb5701be6588ff3f
SHA-256: b254bc051fd0118b29b4e215dcd43594e2d8ef7d85468c05096e33d766843c02
Size: 17.28 MB - kernel-rt-debug-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 8e42ddb739d4d3f38e49f2521331fbc2
SHA-256: 422365c16fff3012bc4209e1d79ebbbf9ff6829ead271fdd467fc2875294e338
Size: 1.10 MB - kernel-rt-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: cda364c28c75ce843dd0241d9209b6d3
SHA-256: daea387e23033756d0a875ded59dfe29d5ed2c31319feb24bd8a2c862af5c163
Size: 18.71 MB - kernel-rt-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 697588b7232cf7710d96fd2045218b36
SHA-256: def3d6e293ac1cc80c108e53f6ecfd45a485568c276b42d2ef6faaec01dc77f1
Size: 21.24 MB - kernel-rt-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 06c54edc386a0556f1cbe73dc6a2cb76
SHA-256: 57159ec46aa6af39e3798bfb93baf663a09dd3ab37d7fc58e2576fd26bc9d885
Size: 41.28 MB - kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: c8f38006f938b586539c30f9c7f99aea
SHA-256: 050536650cb939e3f3fb5216349d1cd099dda36b3bb5bd094a5988cfa07b1b62
Size: 32.13 MB - kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 489cd65a2eb257104370fd8f7da461a8
SHA-256: db05656597b2785800f03b87b85a38ab1bd78a06a6e6f3491921e490499f8caf
Size: 1.55 MB - kernel-rt-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 140e8067db7556c31d3102f5cf61d5a0
SHA-256: e31acd573440c9b04fca32be7bc647f957a7a79829b1814ac20121893846a42d
Size: 21.10 MB - kernel-rt-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 70dfe5ed861e66d463b158a64c01965a
SHA-256: 343151fa8787d3594c773a226a84bc420e63ddea8237a515d42dd3b8526dcfaa
Size: 39.77 MB - kernel-rt-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 4249a7e44e468318e4abb89881c0756f
SHA-256: 9b291f2f4f96e5d6196a982da639ac5a97aaae3a80f663c877a2b3152cf13f0f
Size: 31.05 MB - kernel-rt-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: cc53738da3a1c356806e8120de120a6a
SHA-256: 31ff76f6d0092e1a4bd311126174f3dc9669284675eeb1e373de3b7bf08a35c8
Size: 1.52 MB - kernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 527db6713957ce1ed62116730b7b08fa
SHA-256: 0b8634dbda90508a3b5c31e6d849e9feacf1198d5be4969c046761d8f5d66592
Size: 1.39 MB - kernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: eeffaa4228b13b42cfef5a8ce54ee099
SHA-256: 281b40658e22e6f398a12f687c155b1f91f6e336496aecd29266a49f9253d0d1
Size: 1.11 MB - kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 80eea227dc3c56f7194cc2166047ebcf
SHA-256: 62d689faee7d10097aa6d1d300ee5d507d64db42fd0d27bfbaf7a6f23af476f6
Size: 1.10 MB - kernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 05b7782e13b75e760791e0c9b1103e2e
SHA-256: b440a82d1b1a745b92c82f6e2619b8cf67aaacc2957a39b74431186bc53f7e8a
Size: 63.95 MB - kernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 9db127a5d51e63b71d3ce9156bf5b901
SHA-256: 3046f1db3e0b0b4b49b55742199446617134b71deedbb4cd445a12cefe7d8a19
Size: 1.12 MB - libperf-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 9a7ad8370b13638260489687a182b6af
SHA-256: 8adfdfb86e1c969777060ae81ee862eee9d8e7b8f44dd8cfc6f530e37dec51c7
Size: 1.12 MB - perf-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 35c5dbab0a3e520794b0b4838db61620
SHA-256: eda351af97a5b2447c7746f8908611b4c513e0f4463eed0c3e47560cc0a5dc36
Size: 3.35 MB - python3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: d9ad9eb66a6e8ebf7def1580af1483fc
SHA-256: 693e09724204b21f8ff92ad3f0692a02b1005e86019a89c573dc202e0edf7cc4
Size: 2.53 MB - rtla-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: b1893d1a9399584e8567b569f1ff7666
SHA-256: 48cad0bb745256e7ddfbbefceffc324f2ed4f5e8876c725fac757017a2e07333
Size: 1.16 MB - rv-5.14.0-611.24.1.el9_7.x86_64.rpm
MD5: 619928b005c8da136f5d0d4510389a77
SHA-256: d12d3d1487a9c2fbba78135cb48ebe6e2a14d850672274b94d7874d916fb2f4e
Size: 1.11 MB