kernel-5.14.0-611.47.1.el9_7

エラータID: AXSA:2026-470:27

Release date: 
Tuesday, April 21, 2026 - 10:39
Subject: 
kernel-5.14.0-611.47.1.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Linux kernel (net/mlx5): Use-after-free in ECVF vports unload leads to denial of service (CVE-2025-38109)
* kernel: Kernel: Privilege escalation or denial of service in nf_tables via inverted element activity check (CVE-2026-23111)
* kernel: Linux kernel: Denial of Service in ice driver due to race condition during VSI rebuild (CVE-2026-23210)
* kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-38109
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix ECVF vports unload on shutdown flow Fix shutdown flow UAF when a virtual function is created on the embedded chip (ECVF) of a BlueField device. In such case the vport acl ingress table is not properly destroyed. ECVF functionality is independent of ecpf_vport_exists capability and thus functions mlx5_eswitch_(enable|disable)_pf_vf_vports() should not test it when enabling/disabling ECVF vports. kernel log: [] refcount_t: underflow; use-after-free. [] WARNING: CPU: 3 PID: 1 at lib/refcount.c:28 refcount_warn_saturate+0x124/0x220 ---------------- [] Call trace: [] refcount_warn_saturate+0x124/0x220 [] tree_put_node+0x164/0x1e0 [mlx5_core] [] mlx5_destroy_flow_table+0x98/0x2c0 [mlx5_core] [] esw_acl_ingress_table_destroy+0x28/0x40 [mlx5_core] [] esw_acl_ingress_lgcy_cleanup+0x80/0xf4 [mlx5_core] [] esw_legacy_vport_acl_cleanup+0x44/0x60 [mlx5_core] [] esw_vport_cleanup+0x64/0x90 [mlx5_core] [] mlx5_esw_vport_disable+0xc0/0x1d0 [mlx5_core] [] mlx5_eswitch_unload_ec_vf_vports+0xcc/0x150 [mlx5_core] [] mlx5_eswitch_disable_sriov+0x198/0x2a0 [mlx5_core] [] mlx5_device_disable_sriov+0xb8/0x1e0 [mlx5_core] [] mlx5_sriov_detach+0x40/0x50 [mlx5_core] [] mlx5_unload+0x40/0xc4 [mlx5_core] [] mlx5_unload_one_devl_locked+0x6c/0xe4 [mlx5_core] [] mlx5_unload_one+0x3c/0x60 [mlx5_core] [] shutdown+0x7c/0xa4 [mlx5_core] [] pci_device_shutdown+0x3c/0xa0 [] device_shutdown+0x170/0x340 [] __do_sys_reboot+0x1f4/0x2a0 [] __arm64_sys_reboot+0x2c/0x40 [] invoke_syscall+0x78/0x100 [] el0_svc_common.constprop.0+0x54/0x184 [] do_el0_svc+0x30/0xac [] el0_svc+0x48/0x160 [] el0t_64_sync_handler+0xa4/0x12c [] el0t_64_sync+0x1a4/0x1a8 [] --[ end trace 9c4601d68c70030e ]---
CVE-2026-23111
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() nft_map_catchall_activate() has an inverted element activity check compared to its non-catchall counterpart nft_mapelem_activate() and compared to what is logically required. nft_map_catchall_activate() is called from the abort path to re-activate catchall map elements that were deactivated during a failed transaction. It should skip elements that are already active (they don't need re-activation) and process elements that are inactive (they need to be restored). Instead, the current code does the opposite: it skips inactive elements and processes active ones. Compare the non-catchall activate callback, which is correct: nft_mapelem_activate(): if (nft_set_elem_active(ext, iter->genmask)) return 0; /* skip active, process inactive */ With the buggy catchall version: nft_map_catchall_activate(): if (!nft_set_elem_active(ext, genmask)) continue; /* skip inactive, process active */ The consequence is that when a DELSET operation is aborted, nft_setelem_data_activate() is never called for the catchall element. For NFT_GOTO verdict elements, this means nft_data_hold() is never called to restore the chain->use reference count. Each abort cycle permanently decrements chain->use. Once chain->use reaches zero, DELCHAIN succeeds and frees the chain while catchall verdict elements still reference it, resulting in a use-after-free. This is exploitable for local privilege escalation from an unprivileged user via user namespaces + nftables on distributions that enable CONFIG_USER_NS and CONFIG_NF_TABLES. Fix by removing the negation so the check matches nft_mapelem_activate(): skip active elements, process inactive ones.
CVE-2026-23210
In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dereference during VSI rebuild Fix race condition where PTP periodic work runs while VSI is being rebuilt, accessing NULL vsi->rx_rings. The sequence was: 1. ice_ptp_prepare_for_reset() cancels PTP work 2. ice_ptp_rebuild() immediately queues PTP work 3. VSI rebuild happens AFTER ice_ptp_rebuild() 4. PTP work runs and accesses NULL vsi->rx_rings Fix: Keep PTP work cancelled during rebuild, only queue it after VSI rebuild completes in ice_rebuild(). Added ice_ptp_queue_work() helper function to encapsulate the logic for queuing PTP work, ensuring it's only queued when PTP is supported and the state is ICE_PTP_READY. Error log: [ 121.392544] ice 0000:60:00.1: PTP reset successful [ 121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 121.392712] #PF: supervisor read access in kernel mode [ 121.392720] #PF: error_code(0x0000) - not-present page [ 121.392727] PGD 0 [ 121.392734] Oops: Oops: 0000 [#1] SMP NOPTI [ 121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S 6.19.0-rc6+ #4 PREEMPT(voluntary) [ 121.392761] Tainted: [S]=CPU_OUT_OF_SPEC [ 121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice] [ 121.393042] Call Trace: [ 121.393047] [ 121.393055] ice_ptp_periodic_work+0x69/0x180 [ice] [ 121.393202] kthread_worker_fn+0xa2/0x260 [ 121.393216] ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice] [ 121.393359] ? __pfx_kthread_worker_fn+0x10/0x10 [ 121.393371] kthread+0x10d/0x230 [ 121.393382] ? __pfx_kthread+0x10/0x10 [ 121.393393] ret_from_fork+0x273/0x2b0 [ 121.393407] ? __pfx_kthread+0x10/0x10 [ 121.393417] ret_from_fork_asm+0x1a/0x30 [ 121.393432]
CVE-2026-23231
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy() with no RCU grace period in between. This creates two use-after-free conditions: 1) Control-plane: nf_tables_dump_chains() traverses table->chains under rcu_read_lock(). A concurrent dump can still be walking the chain when the error path frees it. 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly installs the IPv4 hook before IPv6 registration fails. Packets entering nft_do_chain() via the transient IPv4 hook can still be dereferencing chain->blob_gen_X when the error path frees the chain. Add synchronize_rcu() between nft_chain_del() and the chain destroy so that all RCU readers -- both dump threads and in-flight packet evaluation -- have finished before the chain is freed.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-611.47.1.el9_7.src.rpm
    MD5: 5ad8ff7e518e6b3920d9e707fd5738d8
    SHA-256: da61ab3ccf5522252e6b88ec1b490200744d9da3216917fdbb296fc37c4cc282
    Size: 144.03 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 98af9e2205e516aa384d97967df54752
    SHA-256: edc136805daf7e9930a159414e1c36f7a97266720dee2ee36941935c3d744c10
    Size: 1.12 MB
  2. kernel-abi-stablelists-5.14.0-611.47.1.el9_7.noarch.rpm
    MD5: c2c5402ded359887224fb99581493c7c
    SHA-256: 1f1efe9b971fa2c0d5d78ba6e8037f7544f8c027bd6b2652e06f4d868d67c102
    Size: 1.14 MB
  3. kernel-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: ab9bcbd6e5d4c669ef358ffc6e38b4e0
    SHA-256: aef5b502bd66588ce754497572f82a240d14239c3872a13944985c0a73a2318d
    Size: 17.39 MB
  4. kernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 0a169d48f8f90fdea6f2946e4bf81ba9
    SHA-256: 1073d54be58961a4dd580bbe4ba1c244b8460dd46c85c9e58f04b779c3a097c5
    Size: 8.06 MB
  5. kernel-debug-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: dee84bb115ab614d9506efee335d8104
    SHA-256: 3dffa7c729ab6208c7b7ad7522236e6f3528f53941bbfc37d388c072d24afa25
    Size: 1.12 MB
  6. kernel-debug-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 9c9b19c4575574cbb9b28d6db02253ee
    SHA-256: 0dc81305adf5306334bb1db9b1aad27d8fa7e4a44f912638fc6c522caa6ccb2f
    Size: 30.99 MB
  7. kernel-debug-devel-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 3b4a35f06a09fe0c969d4eea4ff57eba
    SHA-256: 584c8089811e872f5bb1858600b97ecf3f2fd450ddf05b1e8ac04b76e8500653
    Size: 21.30 MB
  8. kernel-debug-devel-matched-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 221888bd6b3fdf4853be84f418495d16
    SHA-256: d95b60ecd9f70e1617ab1e2c3661e6c5a904e4ade3122be19486c1e79b69d83e
    Size: 1.12 MB
  9. kernel-debug-modules-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: e1a7e4dbe290f0967b0fa948cdc8c461
    SHA-256: 09977c21be55a2a6f7831e87cdaa6b5b6703dce5b39b66c6cdb4430a33aec415
    Size: 69.37 MB
  10. kernel-debug-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 656a836414c1141cddd36c88551cfb36
    SHA-256: cd4bd9205cd96f96f2772747d5c0ecbcfecf3633b6d527bd78f7aabdae09d713
    Size: 49.54 MB
  11. kernel-debug-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 15d0deebe80b10466535ae22697be2bf
    SHA-256: dee96faa3f0736b0d24488dd622a9165104f39a1e3eebebf77e2eef79e3ce45d
    Size: 1.92 MB
  12. kernel-debug-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 13d90ce36cd8d91b8c1cc091a579ae43
    SHA-256: b4fa6f728f085cde5d6ce67dd4a27c3bd160f9f2225dde6dd66a2eb8b4822086
    Size: 85.85 MB
  13. kernel-devel-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: abad82a5b02be69e3326fc8b96ad2410
    SHA-256: f15c6606d182cbb20df89704dd7914d8c4abe33e0b2ad11340c824c23da8e9c2
    Size: 21.14 MB
  14. kernel-devel-matched-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 731f4ff9f59c8f1f72efab046235a9eb
    SHA-256: 648d76d6f6c67493e1514b17de077d1853c902a3247c942fe7cb435ace4d967d
    Size: 1.12 MB
  15. kernel-doc-5.14.0-611.47.1.el9_7.noarch.rpm
    MD5: 549d000fbee4ae9290b7098e8e558f45
    SHA-256: fffce85e6c9cb908dc13455bd858f4c4b0c4a17c88c54d1bc8d03b262acfb6aa
    Size: 38.86 MB
  16. kernel-headers-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: b0b40a4ee87debe8f6e4c727175d3ed2
    SHA-256: 1b45ccfa688cdf468f53cf5e2ef5b81c998935a5124f2ba2959a1d5a518b219a
    Size: 2.87 MB
  17. kernel-modules-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 2078a6bc1fb4e65cc858650fdb5347a1
    SHA-256: 0a5d65d5a17ae35ca587a87ac15ee0e769dabddd7d9bbe7f419ff667d253c22f
    Size: 39.78 MB
  18. kernel-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 96b8e631d929ba47a6b14760b469edd6
    SHA-256: 7c1e853b2fee5f6028b80b7f2d9c5e42066bddcc289c1fceb02f67730a7fcdc7
    Size: 30.99 MB
  19. kernel-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 8b6582f91baefab4d0d239698fd190c5
    SHA-256: 93a75235fa528f32bef408d16bdfbab5c928a31d966bdf7072cd7816a3741352
    Size: 1.55 MB
  20. kernel-rt-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: e525ad5ae2e57bd4fa6901c092eabe7e
    SHA-256: 6bc5dfc3b56f8d0438f8f29bd96428c4f884b5c47963b5db6f347fdb62176ef1
    Size: 1.12 MB
  21. kernel-rt-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 52f881e89f4235fa755482e87b5df7f4
    SHA-256: b645e7d48c970efb9b4ea80120ecc23f92ec2d3597426e39ac7010ad58843aa3
    Size: 17.31 MB
  22. kernel-rt-debug-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 1f53860a5d0c1314520d2b35c5734e3a
    SHA-256: e0a0cc0465a69a789fba450257fe5de79fff204f7f7919b3cfa6cbe4f690952c
    Size: 1.12 MB
  23. kernel-rt-debug-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: d0399fba9e8ee034858cd2d591576afa
    SHA-256: a02374c556aad0230da188d2b2e9b83cf8d7fa787f622d44c4ebe611aa38be3e
    Size: 18.74 MB
  24. kernel-rt-debug-devel-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: b0f0bb940df7295165f64bc37c0f35bf
    SHA-256: fa3e5f7cf8e028229408b9290111981e728a2c415e9393140496d149d27b2161
    Size: 21.26 MB
  25. kernel-rt-debug-modules-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 874539ded37176ed0909b45606f8a0f7
    SHA-256: c80bbe363f16b2eeaf5a684ffdd4afd5b31ce57e6ca77f9bbb394f47e835a202
    Size: 41.31 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: ae3f31a2db47d3d27ea1f909d2208e51
    SHA-256: 55f7c6ae6ba464e4c2960cef3a38b14272b14e8241a308e0705fec814f46b05d
    Size: 32.16 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 524b4c2cf89fa0b12cf0b688a3fd4e53
    SHA-256: 06866d40dd7d33acf87d2abd963050d27d91767a8a213ada63670b65bbd6f88b
    Size: 1.58 MB
  28. kernel-rt-devel-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 4fce2d1499783170ba1351d898a326a3
    SHA-256: 28ab42ec7b19f79fc109e95781d8bc80e8d91a4f834f7fa383ab11c77b9cd1ac
    Size: 21.12 MB
  29. kernel-rt-modules-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 7d600c14d17175fef8e900b13948eedf
    SHA-256: 690baede670c31d66f29d3a7c4d715bc98e86fb50aca6f4ddf8f8c21bd66fc0f
    Size: 39.83 MB
  30. kernel-rt-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: ee9b102941d75665fce2b6f647ac3698
    SHA-256: b59d9605b5e4d112364341b4caa78230051ed7f32f624bb7641c39cce524e304
    Size: 31.06 MB
  31. kernel-rt-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: c41beb1db82619c0fee092f834dea12b
    SHA-256: 1aadc2042e22402054b40a3b7cef469fc08acf6a8663fe938fe2fbe07747cac1
    Size: 1.56 MB
  32. kernel-tools-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 0d367c7c88776bbfcd551ebedbf00e95
    SHA-256: 919cb1466ad6b2f41ef7e64eb65b8f627ec88a765b58207750ef7529f5736180
    Size: 1.41 MB
  33. kernel-tools-libs-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: ceb65ab55bc2dbebf617e05b4b4b8ac3
    SHA-256: f0b3cd696437e5fc765797ab3392d674a164083dddce80f76a5a42fdf4797ffe
    Size: 1.13 MB
  34. kernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 74cdb730fb3ea616cc0b3a3817a7ebba
    SHA-256: c196f2a4aeaac3eef8a3a4609886575913b320e76f71c2e41d1d9ba803a39680
    Size: 1.12 MB
  35. kernel-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: f1af210357de31d20f36bde44ec68534
    SHA-256: 5c89fcebbc389cd17d53271a65b3cb013e82ac7c108efc27589cd2f8bd9ceb56
    Size: 63.99 MB
  36. kernel-uki-virt-addons-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 2acfc9260bf1f0ab490b7f124f60c7f1
    SHA-256: 740e43225ad02221a7bf9136f38b015ed482b9e6d8ec4be756ace004b687e71b
    Size: 1.14 MB
  37. libperf-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: ddf9d3997301c52b92f220b142a95236
    SHA-256: 0d1449f49edf98d42771f80166d0ead92ad0bc14d54b936f84baa1ebe432bd82
    Size: 1.14 MB
  38. perf-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 3a117dd3654264dc2376f0ca9f6027a4
    SHA-256: 578efe843de2fba02262b186afca8912a9d085518c34c5d50af785038e5c0aae
    Size: 3.37 MB
  39. python3-perf-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: 1242d6e5ba2fcdb52747a64873ae7981
    SHA-256: b9ae3d3e1e7cbc0774952a577cf8763b020f3a4144774f0a05881b72d3f97022
    Size: 2.54 MB
  40. rtla-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: bf83c9b21a05bc5b995ad0ac7e6af457
    SHA-256: bd31c4206e4484135663c6eb0a025dbb7b5eb6e0d5757dd3da5a1ca8a0c6ff9d
    Size: 1.18 MB
  41. rv-5.14.0-611.47.1.el9_7.x86_64.rpm
    MD5: dddb8d975279b84b62a3d25a71faee7f
    SHA-256: 58f3a313f35226790e5e639cdeca41ff45b4a131182f34b8ce344ed9374579ee
    Size: 1.13 MB