kernel-4.18.0-553.66.1.el8_10

エラータID: AXSA:2025-10755:54

リリース日: 
2025/08/19 Tuesday - 14:57
題名: 
kernel-4.18.0-553.66.1.el8_10
影響のあるチャネル: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-50020
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integral to cluster size results in the last iteration attempting to grow the fs by a negative amount, which trips a BUG_ON and leaves the fs with a corrupted in-memory superblock.
CVE-2025-21928
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() The system can experience a random crash a few minutes after the driver is removed. This issue occurs due to improper handling of memory freeing in the ishtp_hid_remove() function. The function currently frees the `driver_data` directly within the loop that destroys the HID devices, which can lead to accessing freed memory. Specifically, `hid_destroy_device()` uses `driver_data` when it calls `hid_ishtp_set_feature()` to power off the sensor, so freeing `driver_data` beforehand can result in accessing invalid memory. This patch resolves the issue by storing the `driver_data` in a temporary variable before calling `hid_destroy_device()`, and then freeing the `driver_data` after the device is destroyed.
CVE-2025-22020
In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241 CPU: 6 UID: 0 PID: 140241 Comm: kworker/6:0 Kdump: loaded Tainted: G E 6.14.0-rc6+ #1 Tainted: [E]=UNSIGNED_MODULE Hardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024 Workqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms] Call Trace: dump_stack_lvl+0x51/0x70 print_address_description.constprop.0+0x27/0x320 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] print_report+0x3e/0x70 kasan_report+0xab/0xe0 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms] ? __pfx___schedule+0x10/0x10 ? kick_pool+0x3b/0x270 process_one_work+0x357/0x660 worker_thread+0x390/0x4c0 ? __pfx_worker_thread+0x10/0x10 kthread+0x190/0x1d0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 Allocated by task 161446: kasan_save_stack+0x20/0x40 kasan_save_track+0x10/0x30 __kasan_kmalloc+0x7b/0x90 __kmalloc_noprof+0x1a7/0x470 memstick_alloc_host+0x1f/0xe0 [memstick] rtsx_usb_ms_drv_probe+0x47/0x320 [rtsx_usb_ms] platform_probe+0x60/0xe0 call_driver_probe+0x35/0x120 really_probe+0x123/0x410 __driver_probe_device+0xc7/0x1e0 driver_probe_device+0x49/0xf0 __device_attach_driver+0xc6/0x160 bus_for_each_drv+0xe4/0x160 __device_attach+0x13a/0x2b0 bus_probe_device+0xbd/0xd0 device_add+0x4a5/0x760 platform_device_add+0x189/0x370 mfd_add_device+0x587/0x5e0 mfd_add_devices+0xb1/0x130 rtsx_usb_probe+0x28e/0x2e0 [rtsx_usb] usb_probe_interface+0x15c/0x460 call_driver_probe+0x35/0x120 really_probe+0x123/0x410 __driver_probe_device+0xc7/0x1e0 driver_probe_device+0x49/0xf0 __device_attach_driver+0xc6/0x160 bus_for_each_drv+0xe4/0x160 __device_attach+0x13a/0x2b0 rebind_marked_interfaces.isra.0+0xcc/0x110 usb_reset_device+0x352/0x410 usbdev_do_ioctl+0xe5c/0x1860 usbdev_ioctl+0xa/0x20 __x64_sys_ioctl+0xc5/0xf0 do_syscall_64+0x59/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 161506: kasan_save_stack+0x20/0x40 kasan_save_track+0x10/0x30 kasan_save_free_info+0x36/0x60 __kasan_slab_free+0x34/0x50 kfree+0x1fd/0x3b0 device_release+0x56/0xf0 kobject_cleanup+0x73/0x1c0 rtsx_usb_ms_drv_remove+0x13d/0x220 [rtsx_usb_ms] platform_remove+0x2f/0x50 device_release_driver_internal+0x24b/0x2e0 bus_remove_device+0x124/0x1d0 device_del+0x239/0x530 platform_device_del.part.0+0x19/0xe0 platform_device_unregister+0x1c/0x40 mfd_remove_devices_fn+0x167/0x170 device_for_each_child_reverse+0xc9/0x130 mfd_remove_devices+0x6e/0xa0 rtsx_usb_disconnect+0x2e/0xd0 [rtsx_usb] usb_unbind_interface+0xf3/0x3f0 device_release_driver_internal+0x24b/0x2e0 proc_disconnect_claim+0x13d/0x220 usbdev_do_ioctl+0xb5e/0x1860 usbdev_ioctl+0xa/0x20 __x64_sys_ioctl+0xc5/0xf0 do_syscall_64+0x59/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e Last potentially related work creation: kasan_save_stack+0x20/0x40 kasan_record_aux_stack+0x85/0x90 insert_work+0x29/0x100 __queue_work+0x34a/0x540 call_timer_fn+0x2a/0x160 expire_timers+0x5f/0x1f0 __run_timer_base.part.0+0x1b6/0x1e0 run_timer_softirq+0x8b/0xe0 handle_softirqs+0xf9/0x360 __irq_exit_rcu+0x114/0x130 sysvec_apic_timer_interrupt+0x72/0x90 asm_sysvec_apic_timer_interrupt+0x16/0x20 Second to last potentially related work creation: kasan_save_stack+0x20/0x40 kasan_record_aux_stack+0x85/0x90 insert_work+0x29/0x100 __queue_work+0x34a/0x540 call_timer_fn+0x2a/0x160 expire_timers+0x5f/0x1f0 __run_timer_base.part.0+0x1b6/0x1e0 run_timer_softirq+0x8b/0xe0 handle_softirqs+0xf9/0x ---truncated---
CVE-2025-37890
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As described in Gerrard's report [1], we have a UAF case when an hfsc class has a netem child qdisc. The crux of the issue is that hfsc is assuming that checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted the class in the vttree or eltree (which is not true for the netem duplicate case). This patch checks the n_active class variable to make sure that the code won't insert the class in the vttree or eltree twice, catering for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mS...
CVE-2025-38052
In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ================================================================== BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840 Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25 Call Trace: kasan_report+0xd9/0x110 mm/kasan/report.c:601 tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840 crypto_request_complete include/crypto/algapi.h:266 aead_request_complete include/crypto/internal/aead.h:85 cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772 crypto_request_complete include/crypto/algapi.h:266 cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181 process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231 Allocated by task 8355: kzalloc_noprof include/linux/slab.h:778 tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466 tipc_init_net+0x2dd/0x430 net/tipc/core.c:72 ops_init+0xb9/0x650 net/core/net_namespace.c:139 setup_net+0x435/0xb40 net/core/net_namespace.c:343 copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508 create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110 unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228 ksys_unshare+0x419/0x970 kernel/fork.c:3323 __do_sys_unshare kernel/fork.c:3394 Freed by task 63: kfree+0x12a/0x3b0 mm/slub.c:4557 tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539 tipc_exit_net+0x8c/0x110 net/tipc/core.c:119 ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173 cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640 process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231 After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue. I reproduce this issue by: ip netns add ns1 ip link add veth1 type veth peer name veth2 ip link set veth1 netns ns1 ip netns exec ns1 tipc bearer enable media eth dev veth1 ip netns exec ns1 tipc node set key this_is_a_master_key master ip netns exec ns1 tipc bearer disable media eth dev veth1 ip netns del ns1 The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited. tipc_disc_timeout tipc_bearer_xmit_skb tipc_crypto_xmit tipc_aead_encrypt crypto_aead_encrypt // encrypt() simd_aead_encrypt // crypto_simd_usable() is false child = &ctx->cryptd_tfm->base; simd_aead_encrypt crypto_aead_encrypt // encrypt() cryptd_aead_encrypt_enqueue cryptd_aead_enqueue cryptd_enqueue_request // trigger cryptd_queue_worker queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work) Fix this by holding net reference count before encrypt.
CVE-2025-38079
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. kernel-4.18.0-553.66.1.el8_10.src.rpm
    MD5: 3238a65fc9e40319db36570493ea6926
    SHA-256: b3a5b42b514cb3e3cf5c3d08fe565213a03cd0e77e60ebe83646014fd2178ba1
    Size: 132.25 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: c37393faddb084b8f4b3037f2f22c94a
    SHA-256: 7099bd03d49db50f5601b7ce0f28ee11ae676721a240a39cd850a110b9c0d198
    Size: 11.23 MB
  2. kernel-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: be18d9699383d49e2a2f38ffb866c7c1
    SHA-256: dff85edbe76480fec85bd379e2b7de05685cdf5b20ec3956f533bde4406929cf
    Size: 10.50 MB
  3. kernel-abi-stablelists-4.18.0-553.66.1.el8_10.noarch.rpm
    MD5: 8bbc2112a3ca44b4f613b6b6e9641320
    SHA-256: e89092707c3dd20ff6f5d4339d1f4282e4e5a45cd37a77b1a99ad7af9195748b
    Size: 10.52 MB
  4. kernel-core-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 739da78c22cf189681488624e8258d18
    SHA-256: 07bfe3f63c9a82bc433dea4f46a6ebd47d5010490679abecafbddf528887c4b4
    Size: 43.53 MB
  5. kernel-cross-headers-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 2fc99f8fe46dc88ad673df70acca78fa
    SHA-256: a6ff19c5e5b67b94ea72d7b59dae53229c5939427c2b5f8e1c3d4ed3b72ceddc
    Size: 15.85 MB
  6. kernel-debug-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 607254f68f0fab7e86cb00779cd400d0
    SHA-256: 19d2cd2a9021b09076d8ba7036664d92dc672d85ab0124e4972677c623df7e8d
    Size: 10.50 MB
  7. kernel-debug-core-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 13cff33325e29ba9a3662d60d9a39b6a
    SHA-256: 984e1068e7e92bc54f0487ec39b4a2b5fc18b268d7492428ede412221e43a10d
    Size: 72.82 MB
  8. kernel-debug-devel-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: ef1ffe353cb68cc04affbe4178cba0fd
    SHA-256: 62ac356d10eefcb8f684d34ece25fb6db6d3cd239ce3df950ae1dcdef99ec447
    Size: 24.33 MB
  9. kernel-debug-modules-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 0e97c77ef87aeccdf47754882eaaa83b
    SHA-256: ae218c480b36bcb5664580af629df7a0bc4a7a6f5504e8efeae8791d9d1ac627
    Size: 65.93 MB
  10. kernel-debug-modules-extra-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 3f2c010280c3b9b23c42bc2894bad3d5
    SHA-256: 25cbbd6b3d3dbeea701ab8f149955981c1f5985a70a31e44d0b538847242d20c
    Size: 11.88 MB
  11. kernel-devel-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: f5e5b69d35caaec3ed8caadc2e5bedcc
    SHA-256: 47b7af5b247754f53837fa7a8a9efe9dc21928f1ce204653c3ac34ada2b9cda8
    Size: 24.13 MB
  12. kernel-doc-4.18.0-553.66.1.el8_10.noarch.rpm
    MD5: 7a426509a7d0fc44e1f689c133896aa2
    SHA-256: b6446d1fe8893ddfbef1df95f9cfb1af1266a4457da495f8bd5c2b382a5ca3dc
    Size: 28.36 MB
  13. kernel-headers-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: f5b3fc48f3fd2edc9efb1616e9cb3790
    SHA-256: 69c5735163e0997e8ae2d9ec25d19418f1bb9f7af12b24405f18dd93b0e19675
    Size: 11.85 MB
  14. kernel-modules-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 35017105872151b90e34a798ee491f0f
    SHA-256: a9bae5bef449b58f99494d13a35bba9efe03bf12885b55be2675f6c24af76b35
    Size: 36.32 MB
  15. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 02b332c23203242d713ae5ae868eb8dd
    SHA-256: 1db7cf4c538d4661c4cbafa72dc6f2066c004e32a114463a6d58c897e1b63371
    Size: 11.19 MB
  16. kernel-tools-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 95200e2027b3a64974de0d00aa243fd3
    SHA-256: 31c67c2bbb8650d33d050d44f40e8a186302071d6ab578f1b66e239674e7a76f
    Size: 10.72 MB
  17. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 787e17887876eb89e3ca3fbbf1d860c4
    SHA-256: 84a4aa58c480f470578ecb9a150ef184225b25b71e33c9079260408e6cac77ce
    Size: 10.51 MB
  18. kernel-tools-libs-devel-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 684fdde0858bb859aa8871991b896a55
    SHA-256: 7220e330d5698d021f837acdbab6d9cf74fddab3d9d605752e4fc31ed7bdbbce
    Size: 10.50 MB
  19. perf-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: 06899cc8ce6edf49c0774982882420bf
    SHA-256: 8ff6dc7bd5c93676db085aa07f21a47c0a680e324c592a8c37d681c0ddd6a66f
    Size: 12.82 MB
  20. python3-perf-4.18.0-553.66.1.el8_10.x86_64.rpm
    MD5: b843dcf390c25189445fd9e538c72a30
    SHA-256: 3a10a5090ea0faa9696b6d9f8f77d1da9d3652947ba5b674ac34682f26fe82cc
    Size: 10.62 MB