kernel-5.14.0-611.24.1.el9_7

エラータID: AXSA:2026-117:06

Release date: 
Monday, February 2, 2026 - 16:47
Subject: 
kernel-5.14.0-611.24.1.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: drm/xe: Make dma-fences compliant with the safe access rules (CVE-2025-38703)
* kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)
* kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)
* kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287)
* kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-38703
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock.
CVE-2025-39933
In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done verify data_offset, data_length and remaining_data_length This is inspired by the related server fixes.
CVE-2025-40277
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
CVE-2025-68285
In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70 Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305 CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266 ... Call Trace: have_mon_and_osd_map+0x56/0x70 ceph_open_session+0x182/0x290 ceph_get_tree+0x333/0x680 vfs_get_tree+0x49/0x180 do_new_mount+0x1a3/0x2d0 path_mount+0x6dd/0x730 do_mount+0x99/0xe0 __do_sys_mount+0x141/0x180 do_syscall_64+0x9f/0x100 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 13305: ceph_osdmap_alloc+0x16/0x130 ceph_osdc_init+0x27a/0x4c0 ceph_create_client+0x153/0x190 create_fs_client+0x50/0x2a0 ceph_get_tree+0xff/0x680 vfs_get_tree+0x49/0x180 do_new_mount+0x1a3/0x2d0 path_mount+0x6dd/0x730 do_mount+0x99/0xe0 __do_sys_mount+0x141/0x180 do_syscall_64+0x9f/0x100 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 9475: kfree+0x212/0x290 handle_one_map+0x23c/0x3b0 ceph_osdc_handle_map+0x3c9/0x590 mon_dispatch+0x655/0x6f0 ceph_con_process_message+0xc3/0xe0 ceph_con_v1_try_read+0x614/0x760 ceph_con_workfn+0x2de/0x650 process_one_work+0x486/0x7c0 process_scheduled_works+0x73/0x90 worker_thread+0x1c8/0x2a0 kthread+0x2ec/0x300 ret_from_fork+0x24/0x40 ret_from_fork_asm+0x1a/0x30 Rewrite the wait loop to check the above condition directly with client->monc.mutex and client->osdc.lock taken as appropriate. While at it, improve the timeout handling (previously mount_timeout could be exceeded in case wait_event_interruptible_timeout() slept more than once) and access client->auth_err under client->monc.mutex to match how it's set in finish_auth(). monmap_show() and osdmap_show() now take the respective lock before accessing the map as well.
CVE-2025-68287
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking `dwc3_remove_requests()`, leading to premature freeing of USB requests and subsequent crashes. Three distinct execution paths interact with `dwc3_remove_requests()`: Path 1: Triggered via `dwc3_gadget_reset_interrupt()` during USB reset handling. The call stack includes: - `dwc3_ep0_reset_state()` - `dwc3_ep0_stall_and_restart()` - `dwc3_ep0_out_start()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 2: Also initiated from `dwc3_gadget_reset_interrupt()`, but through `dwc3_stop_active_transfers()`. The call stack includes: - `dwc3_stop_active_transfers()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 3: Occurs independently during `adb root` execution, which triggers USB function unbind and bind operations. The sequence includes: - `gserial_disconnect()` - `usb_ep_disable()` - `dwc3_gadget_ep_disable()` - `dwc3_remove_requests()` with `-ESHUTDOWN` status Path 3 operates asynchronously and lacks synchronization with Paths 1 and 2. When Path 3 completes, it disables endpoints and frees 'out' requests. If Paths 1 or 2 are still processing these requests, accessing freed memory leads to a crash due to use-after-free conditions. To fix this added check for request completion and skip processing if already completed and added the request status for ep0 while queue.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-611.24.1.el9_7.src.rpm
    MD5: 3a3b06d7f1ce320e09aaaca6051a6f2b
    SHA-256: 83bfecf426d6740d263e8f2294b6ed3d538281637b55af0c4b8b02f42c013a6e
    Size: 143.99 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 684837423ec95b97ba86a56a113cb4ad
    SHA-256: c7408916e786e822b727ccb166c783a73f7b1f619b25015fa5acc3483d9e9d05
    Size: 1.10 MB
  2. kernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm
    MD5: a84da3b40ca82a9f7816635802b3c3f3
    SHA-256: 7893dfadc9205cc5fb5b3ca697a7a659d5a815c955d3a22526c469d14e51ef27
    Size: 1.12 MB
  3. kernel-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: a9a28fabc31fc5585c7628876074f44f
    SHA-256: 0de5cdb5ffba77b5e5213db6774a05b788efa2399a941c3fe4bc28dc38fffaa3
    Size: 17.37 MB
  4. kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: d6e8cb02a3ce7c50222a17e5c5798b7f
    SHA-256: 5fd493b014d537f31dd4f55870de4afe3e8ee79724c7a7e48a04360dfbed220b
    Size: 8.04 MB
  5. kernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: fd5e262f8263240e9f45e5e79ee7b0aa
    SHA-256: 6751348588bf0d29dbde31109cbbe67d3382a0f0821e9ea3481f6ffe1b164bf0
    Size: 1.10 MB
  6. kernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 42892de827978fb2f8ac05fd3fb0a9af
    SHA-256: 809c629f1beddaac5bad40fcb606c4f173514d442ad4525a44dbaa516c2baedf
    Size: 30.95 MB
  7. kernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: ff57d8ed222fc64e4ca6a3a61339d883
    SHA-256: e7daf5e8d98467b633ddb16255eae90fe9082b1cf1221f21aeb91fbb6630521a
    Size: 21.28 MB
  8. kernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 5e63fe94fe5526b21d915890c0342180
    SHA-256: 3c26bd3d86c41e385f74050a84ab3070cfc04f1e3c89f3f204a35986e861244e
    Size: 1.10 MB
  9. kernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 4fe2315bc0a88af337296436e2f6f46e
    SHA-256: 46260a0c399d945e6dc3775e86e695a8c7c7c1b8c559ee621781e91fc3a88ce7
    Size: 69.33 MB
  10. kernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 860297a09b20b332f864d76f444136b4
    SHA-256: eb74cfa7834b59e2f2e10e7a5f9b31aa4fbd0b09ab7fa27315d449774f2fee72
    Size: 49.52 MB
  11. kernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 8fb11ca75f91ad5bcc83c66c193b88b2
    SHA-256: 1de3b44c39a3c1ab1579f9f9a5050b67c8b1124f769d7caa55119dcdd8c403eb
    Size: 1.87 MB
  12. kernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 2d640ec3f4934d730a07e6a1925c924f
    SHA-256: a3e5eca68d26d9a690dbd6ce2386d44da50780a4a647fca918bf71a016716274
    Size: 85.82 MB
  13. kernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: c01193d86342832b846f3476007e70fc
    SHA-256: 93acc6a0e36813a4568e7a122edd89f0d96f81935531d862fedc7fc110463e57
    Size: 21.12 MB
  14. kernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: edc374160219a02cfee21612a8c0e4a6
    SHA-256: 614fce3d1644f2b1f7577a0d9ab5150f64839757f6ffb9e47e1c1c9680a2b8a5
    Size: 1.10 MB
  15. kernel-doc-5.14.0-611.24.1.el9_7.noarch.rpm
    MD5: 68bf1f207cdb32668b070f3984759ce0
    SHA-256: edc033f0758de7eccdfdc0a3a2075decfed8bde1bc040e864ebfd05060ac890c
    Size: 38.84 MB
  16. kernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: db236d9ca7e363d641761e0eb8ba5e8d
    SHA-256: 296df27ec4f3f7c4b46bc52280f8160a61e323ebffe1817797f723d527c5f789
    Size: 2.86 MB
  17. kernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 8327a4618741ff1fe908c11bd837d29f
    SHA-256: 1e625cff4057d1ee9d9e9ff4c00ae2889032763acb50894118e8f709dd4726a3
    Size: 39.76 MB
  18. kernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 2d28d7645ebf13bfdf6c6b518ff318d1
    SHA-256: 874ecc3d227158f7b13f6847ecb17999578521f2b11369162def1196d8af6139
    Size: 30.97 MB
  19. kernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 4312f165331acb45c890a6f53cdece1a
    SHA-256: 4c5529356b8209760b1efa43f723a85ded46f01180f1ded66fb0f6c69a48be72
    Size: 1.52 MB
  20. kernel-rt-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 5800c08a948be0fadd3ebf8ff476a43f
    SHA-256: 92beedc7cc1f5a94d6c77b05c46124eba6c2f6388109986ddfe8cf50423c3f3c
    Size: 1.10 MB
  21. kernel-rt-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 0cbbf284ea968b08bb5701be6588ff3f
    SHA-256: b254bc051fd0118b29b4e215dcd43594e2d8ef7d85468c05096e33d766843c02
    Size: 17.28 MB
  22. kernel-rt-debug-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 8e42ddb739d4d3f38e49f2521331fbc2
    SHA-256: 422365c16fff3012bc4209e1d79ebbbf9ff6829ead271fdd467fc2875294e338
    Size: 1.10 MB
  23. kernel-rt-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: cda364c28c75ce843dd0241d9209b6d3
    SHA-256: daea387e23033756d0a875ded59dfe29d5ed2c31319feb24bd8a2c862af5c163
    Size: 18.71 MB
  24. kernel-rt-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 697588b7232cf7710d96fd2045218b36
    SHA-256: def3d6e293ac1cc80c108e53f6ecfd45a485568c276b42d2ef6faaec01dc77f1
    Size: 21.24 MB
  25. kernel-rt-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 06c54edc386a0556f1cbe73dc6a2cb76
    SHA-256: 57159ec46aa6af39e3798bfb93baf663a09dd3ab37d7fc58e2576fd26bc9d885
    Size: 41.28 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: c8f38006f938b586539c30f9c7f99aea
    SHA-256: 050536650cb939e3f3fb5216349d1cd099dda36b3bb5bd094a5988cfa07b1b62
    Size: 32.13 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 489cd65a2eb257104370fd8f7da461a8
    SHA-256: db05656597b2785800f03b87b85a38ab1bd78a06a6e6f3491921e490499f8caf
    Size: 1.55 MB
  28. kernel-rt-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 140e8067db7556c31d3102f5cf61d5a0
    SHA-256: e31acd573440c9b04fca32be7bc647f957a7a79829b1814ac20121893846a42d
    Size: 21.10 MB
  29. kernel-rt-modules-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 70dfe5ed861e66d463b158a64c01965a
    SHA-256: 343151fa8787d3594c773a226a84bc420e63ddea8237a515d42dd3b8526dcfaa
    Size: 39.77 MB
  30. kernel-rt-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 4249a7e44e468318e4abb89881c0756f
    SHA-256: 9b291f2f4f96e5d6196a982da639ac5a97aaae3a80f663c877a2b3152cf13f0f
    Size: 31.05 MB
  31. kernel-rt-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: cc53738da3a1c356806e8120de120a6a
    SHA-256: 31ff76f6d0092e1a4bd311126174f3dc9669284675eeb1e373de3b7bf08a35c8
    Size: 1.52 MB
  32. kernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 527db6713957ce1ed62116730b7b08fa
    SHA-256: 0b8634dbda90508a3b5c31e6d849e9feacf1198d5be4969c046761d8f5d66592
    Size: 1.39 MB
  33. kernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: eeffaa4228b13b42cfef5a8ce54ee099
    SHA-256: 281b40658e22e6f398a12f687c155b1f91f6e336496aecd29266a49f9253d0d1
    Size: 1.11 MB
  34. kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 80eea227dc3c56f7194cc2166047ebcf
    SHA-256: 62d689faee7d10097aa6d1d300ee5d507d64db42fd0d27bfbaf7a6f23af476f6
    Size: 1.10 MB
  35. kernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 05b7782e13b75e760791e0c9b1103e2e
    SHA-256: b440a82d1b1a745b92c82f6e2619b8cf67aaacc2957a39b74431186bc53f7e8a
    Size: 63.95 MB
  36. kernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 9db127a5d51e63b71d3ce9156bf5b901
    SHA-256: 3046f1db3e0b0b4b49b55742199446617134b71deedbb4cd445a12cefe7d8a19
    Size: 1.12 MB
  37. libperf-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 9a7ad8370b13638260489687a182b6af
    SHA-256: 8adfdfb86e1c969777060ae81ee862eee9d8e7b8f44dd8cfc6f530e37dec51c7
    Size: 1.12 MB
  38. perf-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 35c5dbab0a3e520794b0b4838db61620
    SHA-256: eda351af97a5b2447c7746f8908611b4c513e0f4463eed0c3e47560cc0a5dc36
    Size: 3.35 MB
  39. python3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: d9ad9eb66a6e8ebf7def1580af1483fc
    SHA-256: 693e09724204b21f8ff92ad3f0692a02b1005e86019a89c573dc202e0edf7cc4
    Size: 2.53 MB
  40. rtla-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: b1893d1a9399584e8567b569f1ff7666
    SHA-256: 48cad0bb745256e7ddfbbefceffc324f2ed4f5e8876c725fac757017a2e07333
    Size: 1.16 MB
  41. rv-5.14.0-611.24.1.el9_7.x86_64.rpm
    MD5: 619928b005c8da136f5d0d4510389a77
    SHA-256: d12d3d1487a9c2fbba78135cb48ebe6e2a14d850672274b94d7874d916fb2f4e
    Size: 1.11 MB