kernel-4.18.0-553.70.1.el8_10
エラータID: AXSA:2025-10780:58
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097)
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush() (CVE-2025-38250)
* kernel: i2c/designware: Fix an initialization issue (CVE-2025-38380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-22097
In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.
CVE-2025-37914
In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mS...
CVE-2025-38250
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported use-after-free in vhci_flush() without repro. [0] From the splat, a thread close()d a vhci file descriptor while its device was being used by iotcl() on another thread. Once the last fd refcnt is released, vhci_release() calls hci_unregister_dev(), hci_free_dev(), and kfree() for struct vhci_data, which is set to hci_dev->dev->driver_data. The problem is that there is no synchronisation after unlinking hdev from hci_dev_list in hci_unregister_dev(). There might be another thread still accessing the hdev which was fetched before the unlink operation. We can use SRCU for such synchronisation. Let's run hci_dev_reset() under SRCU and wait for its completion in hci_unregister_dev(). Another option would be to restore hci_dev->destruct(), which was removed in commit 587ae086f6e4 ("Bluetooth: Remove unused hci-destruct cb"). However, this would not be a good solution, as we should not run hci_unregister_dev() while there are in-flight ioctl() requests, which could lead to another data-race KCSAN splat. Note that other drivers seem to have the same problem, for exmaple, virtbt_remove(). [0]: BUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline] BUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937 Read of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718 CPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xd2/0x2b0 mm/kasan/report.c:521 kasan_report+0x118/0x150 mm/kasan/report.c:634 skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline] skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937 skb_queue_purge include/linux/skbuff.h:3368 [inline] vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69 hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline] hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592 sock_do_ioctl+0xd9/0x300 net/socket.c:1190 sock_ioctl+0x576/0x790 net/socket.c:1311 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcf5b98e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929 RDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009 RBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528 Allocated by task 6535: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635 misc_open+0x2bc/0x330 drivers/char/misc.c:161 chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414 do_dentry_open+0xdf0/0x1970 fs/open.c:964 vfs_open+0x3b/0x340 fs/open.c:1094 do_open fs/namei.c:3887 [inline] path_openat+0x2ee5/0x3830 fs/name ---truncated---
CVE-2025-38380
In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().
Update packages.
In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.
In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported use-after-free in vhci_flush() without repro. [0] From the splat, a thread close()d a vhci file descriptor while its device was being used by iotcl() on another thread. Once the last fd refcnt is released, vhci_release() calls hci_unregister_dev(), hci_free_dev(), and kfree() for struct vhci_data, which is set to hci_dev->dev->driver_data. The problem is that there is no synchronisation after unlinking hdev from hci_dev_list in hci_unregister_dev(). There might be another thread still accessing the hdev which was fetched before the unlink operation. We can use SRCU for such synchronisation. Let's run hci_dev_reset() under SRCU and wait for its completion in hci_unregister_dev(). Another option would be to restore hci_dev->destruct(), which was removed in commit 587ae086f6e4 ("Bluetooth: Remove unused hci-destruct cb"). However, this would not be a good solution, as we should not run hci_unregister_dev() while there are in-flight ioctl() requests, which could lead to another data-race KCSAN splat. Note that other drivers seem to have the same problem, for exmaple, virtbt_remove(). [0]: BUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline] BUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937 Read of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718 CPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().
N/A
SRPMS
- kernel-4.18.0-553.70.1.el8_10.src.rpm
MD5: 54dc18bd91c8d46492d7deeabc9dc146
SHA-256: 82a0302adc18c11f71a79a26e093c34c36491cf9176b0a721597d5378ad71f77
Size: 132.26 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: d1b89462027e35e8cae8b9ef51bf8bdb
SHA-256: 417317e6e03a3180f4ad59a119154bbd89205d32e2425de9575214dba747529f
Size: 11.23 MB - kernel-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 27185ca5b8b3f1fbbc223e4907c47e9d
SHA-256: 1b260437064fead33a256ef224729ed0f3b423673f3c4294d00d5d64a56bca05
Size: 10.50 MB - kernel-abi-stablelists-4.18.0-553.70.1.el8_10.noarch.rpm
MD5: 281f5228c9810cc740eebf47141e8d42
SHA-256: 2f31255a2b871f3f0a90302dcd9426d63f8c763c36b156c40c854f1d50177d3b
Size: 10.52 MB - kernel-core-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 0ffe20a896bf036476f74525fc83d9b4
SHA-256: 1ddc17365183ecfe06eea2eccae3817d02da40a629ada722385c63771b530489
Size: 43.53 MB - kernel-cross-headers-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 9d362ada8c67e0ec2105bb3d033ec881
SHA-256: 127e65ce42274f096fb463803334ccd0f8395bbb2105ec38c1c85c9dd0dac463
Size: 15.85 MB - kernel-debug-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: a67665b49b6ba356c398b4b41cbfc356
SHA-256: f1297ed3cbf5f0d8aea219fc089113093bffde90396efe240d854bf1845c67ba
Size: 10.50 MB - kernel-debug-core-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: c9c4ce97efb2e83ba2d652035b6be96a
SHA-256: 9756ad7fefe3ffaccc6a86d2ef67012118e0f29cf3b71bcf0b0240a88d078694
Size: 72.82 MB - kernel-debug-devel-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: f534d6373f62186d354d86fccb9435f4
SHA-256: 26122b56a62fe10987cc178767fbc5c13ac9bfb723d7cdc056925d979d0141f0
Size: 24.33 MB - kernel-debug-modules-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 3c8a6abad82cb0bc2cafeb3dfb60e56b
SHA-256: dfbc04b334a43da17e690eca90098f97306b628b44ba6052193c5ee0dccf607f
Size: 65.95 MB - kernel-debug-modules-extra-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: c68998bd23ce94fb1bb42487e0530479
SHA-256: a5139884b7ea3fb340d9bd0b1629a24e38de29271fc627c5cd31c1e091e00441
Size: 11.88 MB - kernel-devel-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: df628563b3b1a28e497a295222e1b926
SHA-256: 00ab184e16e8dff0bcad657efbd27e18d3261a1626679cab617d930101a483e3
Size: 24.14 MB - kernel-doc-4.18.0-553.70.1.el8_10.noarch.rpm
MD5: e2464dcdb702f2017e608b28cc401b38
SHA-256: 4cc13cee98d4435b5d98f3b308f5382da6151f539d5bf9a8f33f77183fb17e80
Size: 28.37 MB - kernel-headers-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: c3cd615ea0f8146143d9be41992aa210
SHA-256: 1f62bf982260b4d036611ad91adad79300792f8a4350cd58f2570c9730b4a8e8
Size: 11.85 MB - kernel-modules-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 956d10fa731f193aadfb1fd42226f78a
SHA-256: 3489503a6ebd26e20a5826914f6418fa44c23378e240091cdefca52453a643f8
Size: 36.33 MB - kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: d28f88ccbe549a555173eb377dcf0c7e
SHA-256: 6ff16c9f6bdbe0b86c5339349935b11ad44df0cb1696d9434ac82e665b83b454
Size: 11.19 MB - kernel-tools-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 52bec43db87213c220e2ab5d6b78c989
SHA-256: b9a4fc16a691fad4abfc1e2f8bf6991528bba505aff2de8f595bb4abd9223788
Size: 10.72 MB - kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: e468ef3294bf6971cccc4ee71262dce9
SHA-256: 3e9638e717cf89f303fda5d6e6daf324747e990fe0fb4283f257742e2c99a0a5
Size: 10.51 MB - kernel-tools-libs-devel-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 7f04bc8d0cb4a4608413cdcc12fe9bc1
SHA-256: 9a69582256746dd3b780cf10488d0b50c482a46fd9add6309fb3efd60dab9a8b
Size: 10.50 MB - perf-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 46362b2a5abb5b51c7f0de5a5cd8a79b
SHA-256: 3f46132616afd0ebbafba2658b36c699074249aff28c423134572779e9dc66e2
Size: 12.82 MB - python3-perf-4.18.0-553.70.1.el8_10.x86_64.rpm
MD5: 24e105f64ad650fe7c825e1ba9fc8787
SHA-256: f67683bdb9d6947e803df9a0cde7ab0ee353efeed41e0c20fa1106054b3ac733
Size: 10.63 MB