kernel-5.14.0-611.54.1.el9_7

エラータID: AXSA:2026-615:34

Release date: 
Friday, May 15, 2026 - 09:26
Subject: 
kernel-5.14.0-611.54.1.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Linux kernel: Denial of Service in libceph OSD client due to unreset sparse-read state (CVE-2026-23136)
* kernel: Linux kernel: Use-after-free in traffic control (act_ct) may lead to denial of service or privilege escalation (CVE-2026-23270)
* kernel: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache (CVE-2026-31402)
* kernel: crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)
* kernel: rxrpc: linearize incoming DATA packet when it has paged frags (CVE-2026-43500)
* kernel: xfrm: esp: avoid in-place decrypt on shared skb frags (CVE-2026-43284)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-23136
In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read state in osd_fault() When a fault occurs, the connection is abandoned, reestablished, and any pending operations are retried. The OSD client tracks the progress of a sparse-read reply using a separate state machine, largely independent of the messenger's state. If a connection is lost mid-payload or the sparse-read state machine returns an error, the sparse-read state is not reset. The OSD client will then interpret the beginning of a new reply as the continuation of the old one. If this makes the sparse-read machinery enter a failure state, it may never recover, producing loops like: libceph: [0] got 0 extents libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read Therefore, reset the sparse-read state in osd_fault(), ensuring retries start from a clean state.
CVE-2026-23270
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks As Paolo said earlier [1]: "Since the blamed commit below, classify can return TC_ACT_CONSUMED while the current skb being held by the defragmentation engine. As reported by GangMin Kim, if such packet is that may cause a UaF when the defrag engine later on tries to tuch again such packet." act_ct was never meant to be used in the egress path, however some users are attaching it to egress today [2]. Attempting to reach a middle ground, we noticed that, while most qdiscs are not handling TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we address the issue by only allowing act_ct to bind to clsact/ingress qdiscs and shared blocks. That way it's still possible to attach act_ct to egress (albeit only with clsact). [1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.... [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn....
CVE-2026-31402
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request.
CVE-2026-31431
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
CVE-2026-43500
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-owned paged fragments (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via __ip_append_data, or a chained skb_has_frag_list()) falls through to the in-place decryption path, which binds the frag pages directly into the AEAD/skcipher SGL via skb_to_sgvec(). Extend the gate to also unshare when skb_has_frag_list() or skb_has_shared_frag() is true. This catches the splice-loopback vector and other externally-shared frag sources while preserving the zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC page_pool RX, GRO). The OOM/trace handling already in place is reused.
CVE-2026-43284
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-611.54.1.el9_7.src.rpm
    MD5: b45789d45f2ecfd7542c9c5539f657ee
    SHA-256: 18a0b5d92960d3de642c1910a303a92e60202c420b0f381d2cf95d69369bb5c7
    Size: 144.06 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: f27e46f914d47a36c3429a1f284f5e19
    SHA-256: 03261b3b50719f24d4391a0e9984e921d77253da233a4b2f8f0aecbe60e8c0b5
    Size: 1.12 MB
  2. kernel-abi-stablelists-5.14.0-611.54.1.el9_7.noarch.rpm
    MD5: e72e1d3674ecf7e171df1ded334c0657
    SHA-256: 072bef58e7ba1156f4992af59b6c596719c9e430d94bd981295c69a1b1099d8c
    Size: 1.14 MB
  3. kernel-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: b2a6e0c11572f5cef4484be15a136448
    SHA-256: a78e8217ddbcd336285cc8c1b92beb3ddfd75f8f4acf2e6676c519f075a1e751
    Size: 17.40 MB
  4. kernel-cross-headers-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 4ff2422cfe4aac471498620e63377cf7
    SHA-256: 565b896f203dd825c39a95f8cbe0ae88d9686eac2a69c54415ecfb61a4843a00
    Size: 8.06 MB
  5. kernel-debug-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 0c7a8c5cb732149d179fb4d2f67ba0e8
    SHA-256: db6b88a7b1ca1a5cab59ef37b3c05242c17310b25b6dc76f871712bc353f4135
    Size: 1.12 MB
  6. kernel-debug-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: b403516b9aa085a83249d5926d2c72fa
    SHA-256: 002c732b1c1991139d68f2a7cb866bfb98e7d43e65a92f5423e6c63c530f06db
    Size: 30.99 MB
  7. kernel-debug-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: a76ae06c9ea9c10ea4eee16a371bdf08
    SHA-256: 0921b50f59a30ca2df83dcb1621a28a7581d6cb356767d4214ccc6bff9f3f011
    Size: 21.31 MB
  8. kernel-debug-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: f53c7e62ad05a9dad1834c9fb97f867e
    SHA-256: 50c3f1678eca7f612392e954f0a1ee2d86f32c48a96bd2660db1e4da2c712233
    Size: 1.12 MB
  9. kernel-debug-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: ef215e09c753c65bcc89857974092409
    SHA-256: 9d09fc4023ad4895c8c2c9a9525a62acbe3a8b114ec6175dc6f3fd69d4493bd9
    Size: 69.37 MB
  10. kernel-debug-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 504ba82c07879607c956978e146aeda0
    SHA-256: 5261e92989638afa1efb12461f995dad52f3b31e6068ed87c1670690ea278463
    Size: 49.55 MB
  11. kernel-debug-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 6fc1f51b42201dc8fdd8348be5a79580
    SHA-256: 9ab5651d12a81431a2014b49ad2ff66d96d5b82e58871f021ad65a7d660dc287
    Size: 1.92 MB
  12. kernel-debug-uki-virt-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 407267671f4919a0399c125a912894f8
    SHA-256: 87c958ffd171cbadca6820dd11bce968c987f3f5611270a01b6f7af0980950e3
    Size: 85.85 MB
  13. kernel-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: ad125edbe1605d7253aa204be0a72131
    SHA-256: 2189f7461207334334ff13bec763e7babbae6c29d43416e8ac51caa2c5e92afb
    Size: 21.14 MB
  14. kernel-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 6f7595a2c2cf58afb162dd8b707452b8
    SHA-256: 0cdc4300e1b066c2ae6bf901790b642ab66078ca8ae43920dbf9c59ccdd79057
    Size: 1.12 MB
  15. kernel-doc-5.14.0-611.54.1.el9_7.noarch.rpm
    MD5: d6ed6b6653f81a6bf1d0c65039d7a6b1
    SHA-256: 5156e87be3ea95d502080e909f68bf607dfba24ee4a607cce0f81f839dac5b32
    Size: 38.87 MB
  16. kernel-headers-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 6c90b16c83fba7e5da6ce0e685ef7628
    SHA-256: 8ba82c71ac680256747b5ba770564abb3d9a6bdaedb4936c2c8d61c952593fc5
    Size: 2.88 MB
  17. kernel-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 9536674bbf30154e021cbb09f2668c6b
    SHA-256: 87f0d15062d02d1bffe933f495a9a027037c7fd919be4166e71496d4548cbee3
    Size: 39.78 MB
  18. kernel-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 389d015ac335a66d46cee4095d7cae2e
    SHA-256: 4b3f7760428f3b4e2e5a7836828dbe7583f88e75f5ffa547841aa70a645ed6ca
    Size: 30.99 MB
  19. kernel-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: ab89713d12129c6add4044590d1ee6d6
    SHA-256: 66fe43c51efd341d0e2beaa7f74344340ba5e4b1b04e6f9925620d4d8652f541
    Size: 1.56 MB
  20. kernel-rt-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 8e21a455f44e2741bc69460c3f07f019
    SHA-256: 64e13be1ede4970c2b16fe9b2c44f20fc0b3ba1566e982814e1e84891c1b1494
    Size: 1.12 MB
  21. kernel-rt-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 380dd7efce80a29417be5a8becba37ee
    SHA-256: c6ed2290c3be4b328f622acc58ffbd4b59a911d86c9c530c9fff5e18890179ed
    Size: 17.32 MB
  22. kernel-rt-debug-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 8669084ecfbea8a08cd4c9738bb9daba
    SHA-256: 777a9c2bedf683ee1ce1a024de9b59c2f84bc53197b02eb8f56f21e9a711d8f3
    Size: 1.12 MB
  23. kernel-rt-debug-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 938846434706dadb2026db3ebcecdbb7
    SHA-256: c3a7ca11b6b5f893852316d1eb2f1377c1172110287d527001eb5115a17b840e
    Size: 18.74 MB
  24. kernel-rt-debug-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 45394d8b53f55eb99bdad085704eec61
    SHA-256: 906a6a97218903d5db5fe9349e08e48ad3913c70d76289ae2472a9dad36c1383
    Size: 21.26 MB
  25. kernel-rt-debug-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 148fdf6b94b3cfe6eb506f307f58c427
    SHA-256: 4610b3293410a3015fd0637085f552a9695a991e4e89d08ca35fb1d84904fa5f
    Size: 41.34 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: d63f41f7bc83044ae89d28cecf69a632
    SHA-256: 2dbe165c7f52e9d682d0e0eec617e52e6b8947b775b07b35362f4574b244f0af
    Size: 32.17 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 1b2bd6804b385f04c5192d1f1dd60e13
    SHA-256: 2eb6046c5be7001a489c35f1f053aad9a51661c18be5e77c4d0e95fcb00e3eb3
    Size: 1.59 MB
  28. kernel-rt-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 8c5b20a15ac4a65a12b21fc84c7d65cf
    SHA-256: 7945730215b758ef8fc38adfe4fa61c45ceec2eb4eef4b464eb65005ea8ea548
    Size: 21.13 MB
  29. kernel-rt-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 2b4aa6d598d10c8869d334978081ee74
    SHA-256: a4d011108f72a446cc362924fc33f200b54d7eef0407de1afff0a1529f3e6943
    Size: 39.83 MB
  30. kernel-rt-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: c173a8cd841506d8ca42a6340a373b94
    SHA-256: 37e831a278afc78aee6c933fd4428f5392424f5a765c54fab6d3ed95978c1654
    Size: 31.08 MB
  31. kernel-rt-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 4e474b5a90c18e02f78133e8dddf3985
    SHA-256: b7e611fd5e32160579806418132a14bb8b1292454a25f3f1aea45493205871dc
    Size: 1.56 MB
  32. kernel-tools-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: edd54e6fe59e9a8b2f18e875ba284102
    SHA-256: 3650a8d53cc0d00f46520b6e566cd097c9a1725f6637a130a5c326bade9b2bca
    Size: 1.41 MB
  33. kernel-tools-libs-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 157e7b62839ed2173e7e327392f9c92a
    SHA-256: 768a6446817f718b46767a26e3978b5f5e0d45523629a20434374fcd7ef01c61
    Size: 1.13 MB
  34. kernel-tools-libs-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: d7645df1408e45b9b2e9687f43e24332
    SHA-256: 35b2bae6fa9917a255210076783c16323d0e7091227bba29a30fa2867cbcc792
    Size: 1.12 MB
  35. kernel-uki-virt-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: a100d316d009db9efba272452dbfa1c4
    SHA-256: 9fffce5b34ea0d2ddf9de16d2bbcb7b6e0e1a4d5e06342e30b309554d2f3934a
    Size: 63.98 MB
  36. kernel-uki-virt-addons-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 011c7f50ce4fbe78c010117aa86274d5
    SHA-256: 949286e24a5d4a7cb01eda25ec0a514ce2f931ab88f1bfbcc37c99172a0ab3cb
    Size: 1.14 MB
  37. libperf-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 9fe1e8d0b126c0456132dc3cdfaf45ae
    SHA-256: 09fc64638ce30b1b2007dcee6a1aa4ed4fb86dfae5452a9c055d694b0110bdca
    Size: 1.14 MB
  38. perf-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: 8fd46eefbb74843953393631ca45bf94
    SHA-256: 2823007f55e2d94a63beec32a636d4c53ee46443b329fe2abfd5f7f2f00156af
    Size: 3.37 MB
  39. python3-perf-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: b414637065ff237691829c8b6965965c
    SHA-256: a2c523b8fbe2cb28bf98716dd55cd15a23361b779ea63c696730cab9bffac78d
    Size: 2.55 MB
  40. rtla-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: c2240e1da12c418dd6d8b61ae0b03d3d
    SHA-256: 9c60b7bb5fe78824a8801c9610c3b915aa8caaf5c41e0056fe373fb88e4a44a6
    Size: 1.19 MB
  41. rv-5.14.0-611.54.1.el9_7.x86_64.rpm
    MD5: c95bd180aa1885e723a441469f5ba773
    SHA-256: ac896d2da0f6b4b8cbe233316bf924243a5d9175850cbdd336af0d9eafab31fa
    Size: 1.14 MB