kernel-5.14.0-570.16.1.el9_6
エラータID: AXSA:2025-10431:39
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: io_uring/sqpoll: zero sqd->thread on tctx errors (CVE-2025-21633)
* kernel: soc: qcom: socinfo: Avoid out of bounds read of serial number (CVE-2024-58007)
* kernel: tpm: Change to kvalloc() in eventlog/acpi.c (CVE-2024-58005)
* kernel: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (CVE-2024-58069)
* kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-58005
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
CVE-2024-58007
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: socinfo: Avoid out of bounds read of serial number On MSM8916 devices, the serial number exposed in sysfs is constant and does not change across individual devices. It's always: db410c:/sys/devices/soc0$ cat serial_number 2644893864 The firmware used on MSM8916 exposes SOCINFO_VERSION(0, 8), which does not have support for the serial_num field in the socinfo struct. There is an existing check to avoid exposing the serial number in that case, but it's not correct: When checking the item_size returned by SMEM, we need to make sure the *end* of the serial_num is within bounds, instead of comparing with the *start* offset. The serial_number currently exposed on MSM8916 devices is just an out of bounds read of whatever comes after the socinfo struct in SMEM. Fix this by changing offsetof() to offsetofend(), so that the size of the field is also taken into account.
CVE-2024-58069
In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.
CVE-2025-21633
REJECTED
CVE-2025-21927
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
CVE-2025-21993
In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warning. As the concept of a subnet mask does not apply to IPv6, the value is set to ~0 to suppress the warning message.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: socinfo: Avoid out of bounds read of serial number On MSM8916 devices, the serial number exposed in sysfs is constant and does not change across individual devices. It's always: db410c:/sys/devices/soc0$ cat serial_number 2644893864 The firmware used on MSM8916 exposes SOCINFO_VERSION(0, 8), which does not have support for the serial_num field in the socinfo struct. There is an existing check to avoid exposing the serial number in that case, but it's not correct: When checking the item_size returned by SMEM, we need to make sure the *end* of the serial_num is within bounds, instead of comparing with the *start* offset. The serial_number currently exposed on MSM8916 devices is just an out of bounds read of whatever comes after the socinfo struct in SMEM. Fix this by changing offsetof() to offsetofend(), so that the size of the field is also taken into account.
In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.
** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warning. As the concept of a subnet mask does not apply to IPv6, the value is set to ~0 to suppress the warning message.
N/A
SRPMS
- kernel-5.14.0-570.16.1.el9_6.src.rpm
MD5: 66f7c43edcecec5023625866ae22aeda
SHA-256: d049559d03caa54412d229bb9b58ef0943ff9f74e59bc03982a30ae8c6bd4603
Size: 142.43 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 917e0211b98ed0cfecf09260848a72e4
SHA-256: c2d88f0d73603f355ad6d14a98a1549be651b93ca6f51a446362477a079cec82
Size: 1.76 MB - kernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpm
MD5: 17f8b463793814f264d6db717f283711
SHA-256: dbf9e7d86e16ebf8c81bf3411309b67c862be70f9b87afd71b096176587d3243
Size: 1.79 MB - kernel-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 4fad53839cc239afb69637a005d4a86d
SHA-256: 0d40daa4d0383fe7a1645cd71314fb15f6f68c758df2c7d5bb38a1299c84b01e
Size: 17.83 MB - kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 5e31d34751e89aaa5809dcc7898051d1
SHA-256: 7b07f68ed2e4fcfc5e822de32eebb2a6459a76e19e44afe154523e01b39fde1e
Size: 8.63 MB - kernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 9fb73e1336174847f5168ff42348e09f
SHA-256: 758ef4cf527acde9f3739e05fc266cb320b8b93ff3976b2c6d138a29fc0575c5
Size: 1.76 MB - kernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 516cbaee293f661e784657730999f66e
SHA-256: 07a5f05391bb91ecaf5fb2ce6857273a9b8c610955a3a1bf9e32100d6bdde662
Size: 31.26 MB - kernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 57bfaac156079ba30714183781d526e9
SHA-256: 9766ad42bc88a72559f96f3bbc91417ae53522940ed30b5b795741408d57dd40
Size: 21.75 MB - kernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 6789dcc4fcad29c1e39140487b0e873a
SHA-256: 9bdb5f3e2e424b54359a667e927feb2f5196c8f951697b2ac166d7a1bd66085b
Size: 1.76 MB - kernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 50032167e3144ddc6b3fba9e18586c11
SHA-256: b8d4c2c129e23cc0d530f3d7ed560469b632a54b2e7680117523eb8a1bab9d01
Size: 67.06 MB - kernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 8e84caf217985e749900e6efd4a147cf
SHA-256: 63d7e4a1bcf7903628f1a3aa1b402e1d59fab9540fafc93147fc6febc50606a5
Size: 48.85 MB - kernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: a9fd54d66301a3ec8924c08371bfe0fc
SHA-256: 0b3957d7de6e092205b7a1bf24617cbc1e56743db554be12b318b61eb332a375
Size: 2.54 MB - kernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 0a9a8ef82c58a832055e7b48febd25a5
SHA-256: 88efd7877a4087fd77eafcb203ebd10cbf550807d63b0deff05c9b5a895912f3
Size: 84.30 MB - kernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 08c36fe6f8c83e6770f32c324f4dca8f
SHA-256: b41e2609554d1fcb42eea759b099581bcdf462d82b5e1311a52d4365e173142e
Size: 21.57 MB - kernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: f0adebf0a6afe6656f7d82f7be18b6c7
SHA-256: b46a2bb68da9644fae3f8ec304ac35f9fc3b85eb519d77a0d1f043de0053225c
Size: 1.76 MB - kernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm
MD5: 532cb49dd670b54d877235e88f38ff59
SHA-256: 4a069e6e23246825ed4302fe9a66f59c44318c6901a58ad0082a639b5f48921b
Size: 37.88 MB - kernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 3ab575281a481cf53ab198d456fdc694
SHA-256: 90b774f8f972670aeaff2122951d2e921d61791746aa52cb7e53ee3bbd024466
Size: 3.50 MB - kernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 5b2aa44069608ab05fd29b27eb844d03
SHA-256: da009aeec0b5fc697974993d170463f7a7e0764e8caa3ed547fd2e5cc98bf834
Size: 38.73 MB - kernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 612c41dd502242ea63e5fd0400f3ee7f
SHA-256: 1cd51a7c1ceafffd7bf5121cdbb574564182b12a39d672fb519133f3ebe07ba0
Size: 30.83 MB - kernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 9d3f2112f404e17ce21a977272a9d9a3
SHA-256: 341d702fd9a63eccb2e6f242b74f95fc9fdf1dcf76490f5ea4d4555f2f756b04
Size: 2.19 MB - kernel-rt-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 493e45619681516ac1396cfbcca1c6d9
SHA-256: 78e88842556a0d4d7697645ee4f116ebc4b6ed2ce70f9002d896722b69f39b92
Size: 1.76 MB - kernel-rt-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: d949240654436650a67b5aa960a8dfb2
SHA-256: 90457370cf07ec25fa522fab12b39c8ba763391045fb179c38716e0662aadb82
Size: 17.72 MB - kernel-rt-debug-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: f94c99841647254ce8222ce8b88f3e1d
SHA-256: 17a17227b4da2b4a2039270c4cdb71179462023e413940b6174aa1e659db8359
Size: 1.76 MB - kernel-rt-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 074be9a151221fb7b777297016a190ef
SHA-256: e903487664df7b6ce50b82b862e68e4b1233e632b91403999c8bac345e77bdae
Size: 19.13 MB - kernel-rt-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 1395c2d0b11578db8683bce392a3e818
SHA-256: 993641955faec381ef00eef2b1a1beda69ed1e9147ebd0f90da8567f7d3496fa
Size: 21.70 MB - kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 1ea9818d8c41cf66758099cd470431a3
SHA-256: 9cf43f1e597d297f16d3520cf4dc5eddbe6ffab909c73733c72d596ec650c527
Size: 2.49 MB - kernel-rt-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 7a5b3ba90862acb4cae98a7fd644c716
SHA-256: c1b0d29aa59cb3d5c51bb2fc567744cbbab780a79bec7fa08ec735176987ce80
Size: 40.14 MB - kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 12663d10b2f48016afb72ec07a553e26
SHA-256: 8f279baef13bc78ecf75035762620abe5cfb3d8e864097e9ab6c0fe590cce190
Size: 31.26 MB - kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: a31812f1a7747fa169fa6bfd5df91d78
SHA-256: 051028dd286736c7ca0347aa33ffdf5a05b8894083e6d1eb45c0c342bf67f01f
Size: 2.21 MB - kernel-rt-devel-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 27433657a8fc1d3da94e38cb93dc4d66
SHA-256: 3995fb7bfa7ee7de3ee31eb8f23edc35488e98d7affdd873edf26391ff7803df
Size: 21.55 MB - kernel-rt-kvm-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: d87af6a3ac445fae9ea4a3100cbce138
SHA-256: ba0ca593219390b6c0811b8cc339cc30e1987f75c654e803c002fbe228ad792e
Size: 2.46 MB - kernel-rt-modules-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: c968289131b915bd2cd9222ebd363b2a
SHA-256: 4b5e2752f0ad02545c0a09168e25d63b70d2f4b0f36fddeddb7e1d4a2e685e42
Size: 38.74 MB - kernel-rt-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: e18eaec6c5a9e0e942e9dc96082b0a2e
SHA-256: 82835d02c6f867888e56c944a725326466d2f07db4ac738be677137df38e5d27
Size: 30.21 MB - kernel-rt-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: e9df898053c35b1977f85004552c7372
SHA-256: 94734a924a5cb4dc8bcb76c0c90c716cb8e8ef0d501be20c4c98ea07348ae83b
Size: 2.19 MB - kernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 1e5a83e75493ae6454c47a9b87ca43ef
SHA-256: c802092f6ad6f8446aef05e32481a1eabca1272f77caf73b42c752e6fa1447e2
Size: 2.05 MB - kernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 7441650c2bd4fcd609b77c6cd7789c72
SHA-256: 41eea54111589f9c13ea3168feac7c1c75557a626a410dbcf7a9904396de6ad3
Size: 1.78 MB - kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: ccdc188a4c1c3c70599bf729bd571959
SHA-256: 55d67e038ad0fc0e9baa0df2011c9c422b26fdd8942a7149b9b2b4eac36ef8c9
Size: 1.77 MB - kernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: b0c20e7dea3271f39155ccf7aa1ae72a
SHA-256: 26bb3cea2fcb59707a6ecab2ee438bd01a268b3fc38c984422ab904de1b5e480
Size: 62.92 MB - kernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 2a707a49b1ec00b8abdf959a64e74384
SHA-256: 3cd5794d8a03a3058981037e5caeb345fc87503ce01ed5e4e2e6d8f38edb4108
Size: 1.79 MB - libperf-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: f1d4f9dd27ff582af57a3b28e7e9a5e7
SHA-256: d9c1d45f7fc2d17d43f35a8772ed01e9e8cf3c75e7256b4b4159350f676ba6d0
Size: 1.78 MB - perf-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 15350c13ac74bbf87c76270715d11ced
SHA-256: 7d91a08053659d1276d8d02b10fca5b1642c31369b1676fb22ab8690ad41580e
Size: 3.99 MB - python3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 2eb1a03569f908c962858c6f9603a101
SHA-256: b955c28fd89dc277f017c185bb08dbfbf57289aaf15eb4d044efcf3108c6477c
Size: 3.17 MB - rtla-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 80ac3ce8db7367b588e1f135f7ddbc19
SHA-256: f483166d1d0fedc202b901625c082e691dde8b59f0845b8787fcf02cb451b434
Size: 1.82 MB - rv-5.14.0-570.16.1.el9_6.x86_64.rpm
MD5: 0592897770f7ecf3a7e8b50232569ff0
SHA-256: edaf371858092fd303d212d18b19a4dd93fbca75c7e79150b5a37ca22a3c98e2
Size: 1.78 MB