kernel-5.14.0-570.46.1.el9_6
エラータID: AXSA:2025-10910:73
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: usb: smsc75xx: Limit packet length to skb->len (CVE-2023-53125)
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: do_change_type(): refuse to operate on unmounted/not ours mounts (CVE-2025-38498)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-53125
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned skb passed up the network stack will leak kernel memory contents.
CVE-2025-37810
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34
CVE-2025-38498
In the Linux kernel, the following vulnerability has been resolved: do_change_type(): refuse to operate on unmounted/not ours mounts Ensure that propagation settings can only be changed for mounts located in the caller's mount namespace. This change aligns permission checking with the rest of mount(2).
CVE-2025-39694
In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Fix SCCB present check Tracing code called by the SCLP interrupt handler contains early exits if the SCCB address associated with an interrupt is NULL. This check is performed after physical to virtual address translation. If the kernel identity mapping does not start at address zero, the resulting virtual address is never zero, so that the NULL checks won't work. Subsequently this may result in incorrect accesses to the first page of the identity mapping. Fix this by introducing a function that handles the NULL case before address translation.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned skb passed up the network stack will leak kernel memory contents.
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34
In the Linux kernel, the following vulnerability has been resolved: do_change_type(): refuse to operate on unmounted/not ours mounts Ensure that propagation settings can only be changed for mounts located in the caller's mount namespace. This change aligns permission checking with the rest of mount(2).
In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Fix SCCB present check Tracing code called by the SCLP interrupt handler contains early exits if the SCCB address associated with an interrupt is NULL. This check is performed after physical to virtual address translation. If the kernel identity mapping does not start at address zero, the resulting virtual address is never zero, so that the NULL checks won't work. Subsequently this may result in incorrect accesses to the first page of the identity mapping. Fix this by introducing a function that handles the NULL case before address translation.
N/A
SRPMS
- kernel-5.14.0-570.46.1.el9_6.src.rpm
MD5: 2d32029e348c268f6d212ce4525a1189
SHA-256: 39c31f2029065b68606236d90af584408d0bdb2acb9954e73fe255aa0c40e84c
Size: 142.59 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 5df61579dab79aceb982ae155516d801
SHA-256: 081f1bbae88c2315a61d63e2b1ab11ec7c2725eb393a2af13681d1d475973816
Size: 1.81 MB - kernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpm
MD5: 87b88b7d2a4f01d3eaa9c5b0bc0b4a5b
SHA-256: d5bcaf3b023d92b157a7f8169ba990b4cf884d4032c4e74a50a30a0797896cb5
Size: 1.83 MB - kernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: d9df8115f4edeee138de166705f845bb
SHA-256: 91cbcb266bf24bebf0a467fe1eabdd256d121452c1bd8ee9d7e10ce205a9744b
Size: 17.88 MB - kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: ce8b9a6624c11f33f383e450664523c4
SHA-256: afbf5b7803ec5629b5562c6c3b77ca700b519cf3d7924e5e620cf6934f7f19df
Size: 8.68 MB - kernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 59cdec83dec70c38c3a4b418fc18321e
SHA-256: 263d1748a6f50a3ad5d2f099592de973af323be69cb27ce0f371ac645f5e4d7b
Size: 1.81 MB - kernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 47520aef0a6bed0bc1eeed5afc910212
SHA-256: 4396a243f9fe74f603110a8568228f7ec1494963f9cf3cfce990b055d8003abc
Size: 31.31 MB - kernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 27a87435017e5c6ef3ea752b56e2e196
SHA-256: f5f2b676493038779f93562447c1533e8d20322ba65ea8566963ff782b5aba3a
Size: 21.80 MB - kernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: acc15e301f0fe8d1b48b3e247bd45072
SHA-256: 91780f64dbca339308c0224fbc77338b9fc7cb9b7081c8ab5fa91560779fddbf
Size: 1.81 MB - kernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 5554f7c8aded398cbd549dfd3fb30cee
SHA-256: 25f16f802ba9120e6ca72f853b39a97a06cb2619495a7a1e79374d01e83eb8c2
Size: 67.50 MB - kernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 1bc9cba26aac7b621477353fde4231ff
SHA-256: 109b9f94591eda0be7331da3a9cb12de866a9161db80be6d5c24fa54c75876d7
Size: 48.92 MB - kernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 969dd8a1e0573bfc7cbd452b7db469d8
SHA-256: f96dc59ea39db1240665ab4878e6d3636747dea7e6272d56a96af7bd0bb21fb0
Size: 2.58 MB - kernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 81af46aa85096df5c6d4494107d7a757
SHA-256: 2aaf92da666b99e1ba3973e950a0ceeb3fddc27dfdd38ba01ae8f60fb18295e7
Size: 84.50 MB - kernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: d139096a114301a445fc7726bbbbb8ae
SHA-256: 0ff59bf614c968c86db3ba7e03bbb8de68a58049c4786c2a32fea01b897e1c09
Size: 21.63 MB - kernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 1a2fe2e66af21d42caad540defd9d6db
SHA-256: 73978362242d02a4c1f12ebd7576707e2a79ed85ac3173afa750b03b125db691
Size: 1.81 MB - kernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm
MD5: 844356189509f6471eb58dfbb29bbf79
SHA-256: 9cafc148410c90731d20570f3b83fd8df24f39c4017b77b97359ede4f87379ec
Size: 37.96 MB - kernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 273f20faeb963d6490a73800f1b2d874
SHA-256: c2717dfe8a37ef838d3f9bca3059c5c9d7eb8c3e7f7da0205fa0b5421fbae84f
Size: 3.55 MB - kernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 52ced5c1fa7a00badb87a24619142b8e
SHA-256: fc96c92f08d3cb1aa835c6fda01e0e6388891c7a400239a94ac3e061a33e385c
Size: 39.05 MB - kernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 21fb38f36ef82160ecfc387cacd36398
SHA-256: 2c37d55f244554ad067a8fee530385076b32705368ceaf817473c06369066a27
Size: 30.91 MB - kernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 41784f6c5a566485ae02b02391a26736
SHA-256: 7e5e683cea3544f407422831418ba43075ba123b6b3b0c0c92824aa7b7065816
Size: 2.23 MB - kernel-rt-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: d2a48837e661c4c50d95e7a8de7f2aa3
SHA-256: d602ee558d0cc49feb22d1de34a1f98d229e5a19c10764d807e1e99bfc7de2ee
Size: 1.81 MB - kernel-rt-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: ff27be84d2762e80ef6401fae88526cc
SHA-256: bfd05bc54b56f1faf000bd843d3c37a32d4452df5f6fb8a29afd8093c2478447
Size: 17.78 MB - kernel-rt-debug-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 5e28a84974e459b2c08fab781a6e2c71
SHA-256: fd8cb3a413f3c5ff88938212355a0a464aab7d9283c82a480b94ccf07329144e
Size: 1.81 MB - kernel-rt-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 2876fb6abf571a0616cbd50831396da6
SHA-256: f65ac470c95afdfe299933e94ce7cc628214cd1b748bdc2adcd43bbe40bf9c06
Size: 19.18 MB - kernel-rt-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 422766759d816b9ec1945c30c9f2cf51
SHA-256: 1a778d9847ad44b75c3b0d7cffd6ddfbda754e6b225eed55543f506885f6698c
Size: 21.76 MB - kernel-rt-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 6fb123ba3913a16e822dcc492fd3a836
SHA-256: 91cfbc448e72cb90277f2ddaf263834c411a06526456c89a233629c2b5491f46
Size: 40.44 MB - kernel-rt-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: ee662e358fbbe0b02e185893135c137a
SHA-256: 970ea7607f695a5c121f1331cdcae41f8210539faccca4023b04cf076559337c
Size: 31.33 MB - kernel-rt-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 969f444c4a89b828dfb266cfb24fc154
SHA-256: 2ebcaf38d25762c70dd1107f4002a4518d43ce72f31b8aa1576289d1c1b39e85
Size: 2.26 MB - kernel-rt-devel-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 17911ebf4c3f0888f6bb11dd69e48468
SHA-256: 5ac50cac8defea16ff910249d8eae719b3dc7caabd736a91477915aa16e6d552
Size: 21.61 MB - kernel-rt-modules-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: f9a2df6bf2b92107b06c50bd442f304b
SHA-256: cb4357ec3e8d17a62e0eb73b4e9139ae288b405c293d0da28024d4f84e12b82d
Size: 39.05 MB - kernel-rt-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: e0dbe16fabe8b35804c767b40d5be90a
SHA-256: 7a7f678db67bb94e78092dfec0cd11f2a685ee6373cea37706dcf41f067dc2fa
Size: 30.29 MB - kernel-rt-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: f8d6fcc70dd53798bf9d5d810249502c
SHA-256: 31d22b9faa69ddb2cdf37dcdb3a45e0ee120149f633afc876eb9b70b34701d7e
Size: 2.24 MB - kernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: b45b77239282bb4eb4843e62667e95f8
SHA-256: e0d502aa049e9656e369cf7742df8da807989de470a4081b2f119b3ccd6163f6
Size: 2.09 MB - kernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: aca6bdfe97a5c60495ab904313f376ee
SHA-256: eca98b15c8a2975e43b90cb5fad9343b91b02b08903478d86756c4727fd0729b
Size: 1.82 MB - kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: f03994e94f4a1b9566a559f2b041975b
SHA-256: a26686b58bf9fe56e704f8783472e42645ab313d4a3f9dd0ba365ca987f6ab0a
Size: 1.81 MB - kernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 8b9d41d2ad23242f306fd71e76671def
SHA-256: 68c4af563aad8a291a7f16ff9f95dea9e653e8b7d4f59164e23e08f24f35cc03
Size: 63.17 MB - kernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: c39428a9f3c6a8eb205884a81bf9756b
SHA-256: 55f196503c85229714d4e4cc2c3ad807b1d215784e7f7d04dc08fe7d94cc2c60
Size: 1.83 MB - libperf-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 563fcf210f021ae1d5cf0675c9cb4194
SHA-256: a3c8c35720535e2e9a4918c68079f7bb23280ebd644af0e10eebbce8518d5a36
Size: 1.83 MB - perf-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 6b7adadbdd44f388012880e726c886ee
SHA-256: 4084ecb44dee4b84ef6ac93d2d7c8060490a920497c5ca58b1951582b35899fd
Size: 4.04 MB - python3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 59b88edf03bbea2175b6cb2a4114316e
SHA-256: 8c7f35dcfb3a654341a45f71002489e7694b6ccf0ce25039a4b124d62828f651
Size: 3.22 MB - rtla-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 1aeaaebfa6884459d51849352d465544
SHA-256: 4100526d29d476e4ac0d96969d0471e494eb22c07e46130905dfa855e3e49e31
Size: 1.87 MB - rv-5.14.0-570.46.1.el9_6.x86_64.rpm
MD5: 1c45ed1acd10edbbca0ad7076da28c08
SHA-256: c9e6f9142c7aa56cfc2e387225db8e5d6619546f22bad2a4faa80badf354e8b5
Size: 1.82 MB