kernel-4.18.0-553.74.1.el8_10
エラータID: AXSA:2025-10841:67
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: bpf: Don't use tnum_range on array range checking for poke descriptors (CVE-2022-49985)
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-49985
In the Linux kernel, the following vulnerability has been resolved: bpf: Don't use tnum_range on array range checking for poke descriptors Hsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which is based on a customized syzkaller: BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0 Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489 CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace: dump_stack_lvl+0x9c/0xc9 print_address_description.constprop.0+0x1f/0x1f0 ? bpf_int_jit_compile+0x1257/0x13f0 kasan_report.cold+0xeb/0x197 ? kvmalloc_node+0x170/0x200 ? bpf_int_jit_compile+0x1257/0x13f0 bpf_int_jit_compile+0x1257/0x13f0 ? arch_prepare_bpf_dispatcher+0xd0/0xd0 ? rcu_read_lock_sched_held+0x43/0x70 bpf_prog_select_runtime+0x3e8/0x640 ? bpf_obj_name_cpy+0x149/0x1b0 bpf_prog_load+0x102f/0x2220 ? __bpf_prog_put.constprop.0+0x220/0x220 ? find_held_lock+0x2c/0x110 ? __might_fault+0xd6/0x180 ? lock_downgrade+0x6e0/0x6e0 ? lock_is_held_type+0xa6/0x120 ? __might_fault+0x147/0x180 __sys_bpf+0x137b/0x6070 ? bpf_perf_link_attach+0x530/0x530 ? new_sync_read+0x600/0x600 ? __fget_files+0x255/0x450 ? lock_downgrade+0x6e0/0x6e0 ? fput+0x30/0x1a0 ? ksys_write+0x1a8/0x260 __x64_sys_bpf+0x7a/0xc0 ? syscall_enter_from_user_mode+0x21/0x70 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f917c4e2c2d The problem here is that a range of tnum_range(0, map->max_entries - 1) has limited ability to represent the concrete tight range with the tnum as the set of resulting states from value + mask can result in a superset of the actual intended range, and as such a tnum_in(range, reg->var_off) check may yield true when it shouldn't, for example tnum_range(0, 2) would result in 00XX -> v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here represented by a less precise superset of {0, 1, 2, 3}. As the register is known const scalar, really just use the concrete reg->var_off.value for the upper index check.
CVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: bpf: Don't use tnum_range on array range checking for poke descriptors Hsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which is based on a customized syzkaller: BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0 Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489 CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
N/A
SRPMS
- kernel-4.18.0-553.74.1.el8_10.src.rpm
MD5: 9356b545946e01ecd750224df51fb88f
SHA-256: 7a0b92aa24f42233fa393600c3a97f9394fbf13d892bd9ee265232fae6b3e08d
Size: 132.26 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 432509118d951531c52d37e588f54598
SHA-256: a3837d76849c76832d560056baff8a63d6ef73bcae1840465d902d2707b5671e
Size: 11.23 MB - kernel-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 361c8c80855608d70d02fc06b30b4038
SHA-256: f40337fab9ffc9b116ae12019305e6dd2518655bd738aabace423157715b0341
Size: 10.51 MB - kernel-abi-stablelists-4.18.0-553.74.1.el8_10.noarch.rpm
MD5: 52d029a2cb1bae5341674d9e314d6479
SHA-256: dcc9365f267fb0f356c8c90f05233f6cafdef70378ca58c34f8da70988b03b49
Size: 10.53 MB - kernel-core-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 4ca62fb614d17d3f96c2123e64de0349
SHA-256: ca291c620272b0237ebfa6c3c28e94b34400f7fcd1e2ed02cf5d31524494f956
Size: 43.54 MB - kernel-cross-headers-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: b2b787d6f432a63106375fc8d824b99c
SHA-256: 80a9109f4b437f3bda8c2940c44a025716af39b2ceb1409eba06722351abca50
Size: 15.85 MB - kernel-debug-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: b86d4da43f4a17d350911137ea8d8aee
SHA-256: b1804e4b97eb7ee6c2c41a3923c10fa2ba8976db1c08e37b5140d6039e076970
Size: 10.51 MB - kernel-debug-core-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: af67a7ce73600d000dc34c367f8a127c
SHA-256: 88a09bc6fa05006126b472b5f793270ef7b89a714ca622f14eb21b96dd77da8a
Size: 72.82 MB - kernel-debug-devel-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 2c351ebb0de76190c5ca3adffd6fa001
SHA-256: 626613436d9c025fb59da5ef317adc6cdd050893ae7de8c37450d2949d865c1e
Size: 24.34 MB - kernel-debug-modules-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: b7886c76b5e18db69d5a43f27dfed941
SHA-256: 069e14510332c3aed63ea07400f827fcb36ff42aff08274b92923e3733a8de4e
Size: 65.93 MB - kernel-debug-modules-extra-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 8da993baae31693a372ba8c2fa12dd80
SHA-256: f3927e32ff48d595164a2e55007363acb50e591b207d169f2b0d6f82642e1a3c
Size: 11.88 MB - kernel-devel-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: c78f38eed42a290fd363c66d0bad4b89
SHA-256: 6a3169b9c3acd2b1290fc2be458b2a97356090d7139468d96127fdd29db233da
Size: 24.14 MB - kernel-doc-4.18.0-553.74.1.el8_10.noarch.rpm
MD5: 740482cea2aaa0a5ae9659c79e26cd90
SHA-256: cc96e985066baab684071b3e25a2433a493b87c86bc6d28bd4031c107822cce2
Size: 28.37 MB - kernel-headers-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: ba56057b95cca7f0d5c1aedee3090c26
SHA-256: c79a8175f329e85ca697eabdfa8a6e29d2d6ebf57755d0b698eb3b93e9902365
Size: 11.86 MB - kernel-modules-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: a2a3a4b62d2db05aee16da1905bb814f
SHA-256: e244acc6eb1fc379c27a20880dea1cb73b7caf00b39d770d3add28209418c2fd
Size: 36.33 MB - kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 6e1940c1baca363b16d3dd7a9e881f0c
SHA-256: 580eeddbb399c356a3be5b043860c56437a948ad706a018d3c1d0f23d9b8d481
Size: 11.20 MB - kernel-tools-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 0575d04d98d61189db1604a96ccceccf
SHA-256: 01848595fd2dbdf2f1ecec1e946aed371ba01a7769f2086dac7b3f01e16a9d55
Size: 10.73 MB - kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 47c1459bcea3704d5443100191977e8b
SHA-256: 5aea712c6727a584b3a216c0aeb9a10ac30db238864b606e7b3f17026df58863
Size: 10.52 MB - kernel-tools-libs-devel-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 48b7761e1c79306a3b8544a472a286c3
SHA-256: 1b43744178206afd0af38421c99de450f15149b5bfb54c10467f7af3350dd9c9
Size: 10.51 MB - perf-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: f8cd2b048802533e1c46158258815b91
SHA-256: efbab470bfc5622b67471cb7a8e3efe59833b168f8b1e8441902edbafff3ff93
Size: 12.83 MB - python3-perf-4.18.0-553.74.1.el8_10.x86_64.rpm
MD5: 993c3b0b9e99992bfaff2f53f41b16bd
SHA-256: 5735df9ba2ece38f0be23e28303c243f5064fc7cce328dd0ac0eb48b670e19d9
Size: 10.63 MB