kernel-5.14.0-570.51.1.el9_6

エラータID: AXSA:2025-10970:78

リリース日: 
2025/10/17 Friday - 08:48
題名: 
kernel-5.14.0-570.51.1.el9_6
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: security/keys: fix slab-out-of-bounds in key_task_permission (CVE-2024-50301)
* kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (CVE-2025-38351)
* kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-50301
In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an out of bounds read: BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36 BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline] BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410 security/keys/permission.c:54 Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362 CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15 Call Trace: __dump_stack lib/dump_stack.c:82 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:123 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560 kasan_report+0x3a/0x50 mm/kasan/report.c:585 __kuid_val include/linux/uidgid.h:36 [inline] uid_eq include/linux/uidgid.h:63 [inline] key_task_permission+0x394/0x410 security/keys/permission.c:54 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793 This issue was also reported by syzbot. It can be reproduced by following these steps(more details [1]): 1. Obtain more than 32 inputs that have similar hashes, which ends with the pattern '0xxxxxxxe6'. 2. Reboot and add the keys obtained in step 1. The reproducer demonstrates how this issue happened: 1. In the search_nested_keyrings function, when it iterates through the slots in a node(below tag ascend_to_node), if the slot pointer is meta and node->back_pointer != NULL(it means a root), it will proceed to descend_to_node. However, there is an exception. If node is the root, and one of the slots points to a shortcut, it will be treated as a keyring. 2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function. However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as ASSOC_ARRAY_PTR_SUBTYPE_MASK. 3. When 32 keys with the similar hashes are added to the tree, the ROOT has keys with hashes that are not similar (e.g. slot 0) and it splits NODE A without using a shortcut. When NODE A is filled with keys that all hashes are xxe6, the keys are similar, NODE A will split with a shortcut. Finally, it forms the tree as shown below, where slot 6 points to a shortcut. NODE A +------>+---+ ROOT | | 0 | xxe6 +---+ | +---+ xxxx | 0 | shortcut : : xxe6 +---+ | +---+ xxe6 : : | | | xxe6 +---+ | +---+ | 6 |---+ : : xxe6 +---+ +---+ xxe6 : : | f | xxe6 +---+ +---+ xxe6 | f | +---+ 4. As mentioned above, If a slot(slot 6) of the root points to a shortcut, it may be mistakenly transferred to a key*, leading to a read out-of-bounds read. To fix this issue, one should jump to descend_to_node if the ptr is a shortcut, regardless of whether the node is root or not. [1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce... [jarkko: tweaked the commit message a bit to have an appropriate closes tag.]
CVE-2025-38351
In the Linux kernel, the following vulnerability has been resolved: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush In KVM guests with Hyper-V hypercalls enabled, the hypercalls HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX allow a guest to request invalidation of portions of a virtual TLB. For this, the hypercall parameter includes a list of GVAs that are supposed to be invalidated. However, when non-canonical GVAs are passed, there is currently no filtering in place and they are eventually passed to checked invocations of INVVPID on Intel / INVLPGA on AMD. While AMD's INVLPGA silently ignores non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error(): invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000 WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482 invvpid_error+0x91/0xa0 [kvm_intel] Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary) RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel] Call Trace: vmx_flush_tlb_gva+0x320/0x490 [kvm_intel] kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm] kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm] Hyper-V documents that invalid GVAs (those that are beyond a partition's GVA space) are to be ignored. While not completely clear whether this ruling also applies to non-canonical GVAs, it is likely fine to make that assumption, and manual testing on Azure confirms "real" Hyper-V interprets the specification in the same way. Skip non-canonical GVAs when processing the list of address to avoid tripping the INVVPID failure. Alternatively, KVM could filter out "bad" GVAs before inserting into the FIFO, but practically speaking the only downside of pushing validation to the final processing is that doing so is suboptimal for the guest, and no well-behaved guest will request TLB flushes for non-canonical addresses.
CVE-2025-39761
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. kernel-5.14.0-570.51.1.el9_6.src.rpm
    MD5: bc98b29c87b7663828719c8f31b61027
    SHA-256: c4cdba1e12803477e0c5fbd1602cfe2e4afd624b86df9eae1ca81df5df02819d
    Size: 142.61 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 93a10fbc960835c5feffe5e675ee0ede
    SHA-256: 48c808ca8298acac7ffa331deed5de56c916569234fe5e2b5b498e469118cc42
    Size: 1.81 MB
  2. kernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpm
    MD5: 6822cd9ff3838ae0147bdfb5fa40e896
    SHA-256: 8284c88f5405bfb3a6a63f8855a3a06bb0d2550728af62693f721ae78ccfe88a
    Size: 1.84 MB
  3. kernel-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: c87614428707e87e56de6f5d75dee49d
    SHA-256: 788315a1fc6e93254fb8af4cf73029b70e55b4dedfc8edfdf3960cb6c03ec002
    Size: 17.89 MB
  4. kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: a98e094f059d668e27e8b348c82ca018
    SHA-256: 02444528cd3cb6840632d78f551a87c1a9535306b934ad52a2a3ad446589a1b8
    Size: 8.68 MB
  5. kernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 94794f98781375b3f30c50cf3024a4a0
    SHA-256: 05cac742d8b7beb7e3d8c4145296403f0c70bedf45a990546ec1146f1cb60f70
    Size: 1.81 MB
  6. kernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: a8207df4bef83548a5afcd64c04fa124
    SHA-256: 32fd198524e0c2e54380193215c5306f373d82d7f32b07b7a3edc213e099e9d3
    Size: 31.32 MB
  7. kernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 7757a2210f1e76397aab692d828d8cf7
    SHA-256: 5a575113115a2d7d33dbd4cc7f57e5882c3a04edeaac934ccd54a50607d72350
    Size: 21.81 MB
  8. kernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 30f269616493823db7e2c67cc88bbc38
    SHA-256: 3bd76eb51e039235d11468e321dab22b138be0283ede560037167034707e1642
    Size: 1.81 MB
  9. kernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 323827395a512de1a361bb71f4af4041
    SHA-256: 8e46ebc4e932fe21b3b4da12889bb928d3e0b28235d62564756ec75ede6d34c9
    Size: 67.57 MB
  10. kernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: e2f3b15abba8cce3bee98c8d3b5743a1
    SHA-256: 3818bc7aeae54fc5cbeda396c4db0d2a702ce46d791982eb518ec7b9df52edd4
    Size: 48.93 MB
  11. kernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: dc9435d349946832195e70e9ed97e684
    SHA-256: dbb53e81119493c2e25e484fe50b5139b725631c9284cdb99583282b6830ccc9
    Size: 2.59 MB
  12. kernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 02c2c4c7e3ba6b5f3b733a684e60ede2
    SHA-256: 2544b8cc3857345adebb0141107d8fa4ef2c3296e0526b907727d92556677cfd
    Size: 84.53 MB
  13. kernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: c092068cd5ae737f99a667aa16483f0b
    SHA-256: 94926862b574b83f4f0b11824d48ad329467471c7026616c4b3745051221aba9
    Size: 21.64 MB
  14. kernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 5806ec173b02838b4bddbb6e9af073fc
    SHA-256: 2bbf0367f3eebb81da86a377378ae4cf1658e1c2e64172fa94c0d13e019d8b89
    Size: 1.81 MB
  15. kernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm
    MD5: 4973f033ba5356512088eac97d03a2dc
    SHA-256: 40d4a3b93026ff069c73ce5e721627c0df34ebc8f2c518afe1db74b48f93c9c9
    Size: 37.96 MB
  16. kernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 5a5759ffa99216ad6dcb4dc46913964d
    SHA-256: f348bcd9328389dffe8e099964baf876e1e72e9db29769df666d19073d735f18
    Size: 3.55 MB
  17. kernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: f4545ae98a4b72a8f1d2677694d2ff0b
    SHA-256: 73f096c3b7cb31186634424a02bf161e6e3a73990c7bc35c7c0b70ec77753e75
    Size: 39.05 MB
  18. kernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 0a0ee233bfc26e22f5ef905bba1bbfa9
    SHA-256: 9c5ef2aa108bd077cc24ff355f8e2641266e66f8c13f3916748a4f3630dd32f7
    Size: 30.90 MB
  19. kernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 1c4141f99ed90c3dcb5b6cad8a5f9743
    SHA-256: e588b873cf805cec2b34dc8039e37af5a709ab704a2e4901575f6e27c33d7ae2
    Size: 2.23 MB
  20. kernel-rt-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: da57b887ad5f429fa7960e4130201b7c
    SHA-256: 274fa6304ab9119b00d4e7a93dbbe28dd122c4705472e75aa397cc5f6a230f7f
    Size: 1.81 MB
  21. kernel-rt-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 76280d329d5e9bb2adc0e9ded7825637
    SHA-256: 386af43c9aab7a71729970a27a211a373378623b2eb0cc9524d386cb5ecc8af9
    Size: 17.79 MB
  22. kernel-rt-debug-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 89527a7cac13d6f77ecc27c2144651f2
    SHA-256: 8f13070f4405288bec6d0d4f65ff3e4adcd6bba54cc01dfa6a518b6ec0e8a7e8
    Size: 1.81 MB
  23. kernel-rt-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 68747e488328bf89ea015e8d02646dc7
    SHA-256: 571ae86d089501dc4f87da973bfd88134241375a84421ad7be5d6fe4733edb1e
    Size: 19.19 MB
  24. kernel-rt-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 3dbdacb1c2243f4cea015011963b31bc
    SHA-256: 3ac15df805ed87f46125b62cca7b55722b74831cc65cc7daab6eab96a96f5f83
    Size: 21.76 MB
  25. kernel-rt-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 7522e0074cef21f05a32b0d88400c2cc
    SHA-256: baabb787622ec41143776107f2d2b53dc459b61fc4348f40b5bc04964df5a879
    Size: 40.45 MB
  26. kernel-rt-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: b57067b4e7e7a7062225dfd93b4ad8ae
    SHA-256: f7c3b84f6bfef4a57ade89d47841410fcb8067bfec47aaca2564d445d38fb646
    Size: 31.33 MB
  27. kernel-rt-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 31f58c8a1537207593e2fac421cd152b
    SHA-256: e1d0e69e2f3a77c397ec789f9ab1898df7ba3e6c547deb6a7c71c92cea4c6ed2
    Size: 2.26 MB
  28. kernel-rt-devel-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 2c153e0dbf53a2852ee48c6a2fae8d0b
    SHA-256: c8110ed67dd4e2a4e7fb1956c7e980a6c921068c252b201ef62c49f532a04d76
    Size: 21.62 MB
  29. kernel-rt-modules-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: c57fcc33cfd27e0c8d2209381ddc04ec
    SHA-256: c2423ec9a4b6b18902653e4a24d597d32b1e84c94165dca35562cbfd47c932c9
    Size: 39.01 MB
  30. kernel-rt-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 6717b9d53b28cf7b2d1795df2ee7b227
    SHA-256: 421d33588bbb2b5d94807d2c34af50f34bc2c43232631806f9aea4e2458eafd7
    Size: 30.28 MB
  31. kernel-rt-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: c5e2cd61a6087b25562512315c7d035c
    SHA-256: 8b2bcf83d33f0a0ff9bfede45bd4110c3ed11739838c9521d37b6c27487b7ebe
    Size: 2.24 MB
  32. kernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 784320892284b6fae6574878f2330588
    SHA-256: 58cded2eb5404af73fd3500c8a7d8f1532f60ecb136810aa957f5c4466f598fa
    Size: 2.09 MB
  33. kernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: edd32a702199bc32d7fa740c43f5c07d
    SHA-256: 51d0ab72287678cb49c23bda83ca1e1dc4c20f3217d7eecc939fe1effef7efb7
    Size: 1.83 MB
  34. kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 455c73a0d1ae009c37cd92bd4af904a3
    SHA-256: 648226a3ab6a24d7cb2528d913478095b5bb71087d2b70fa49d1440f40f5cdf5
    Size: 1.82 MB
  35. kernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: f53fb716206eff18253949be046f4322
    SHA-256: 3b2bdb304f9efea736eda1335ad3d7e0228fcf3d695de86700eef8e4c736e25e
    Size: 63.17 MB
  36. kernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 4c7337911481c6913835b96ae2523d1b
    SHA-256: 5ea11d9532c71bd2cc06438ec6418e2111bca0f0fc826bef4802a268216a7fdd
    Size: 1.83 MB
  37. libperf-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 83614a95a3b8f6ed8909cc974d4f8429
    SHA-256: 67a754d33682433e149c27a845f22988051e0ab2581a1d96853e5f715cc9b9a8
    Size: 1.83 MB
  38. perf-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: af5f59b51a2dff03a81254cd3d43a658
    SHA-256: e3613913475161f023284cd5f266db3e28943e1ca341bccd24e6847bdc76ea0d
    Size: 4.04 MB
  39. python3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 1d444f285143cb494225480f448a5b8b
    SHA-256: fd325b89ff3f41f319bcdebbf7a3c4155222d787716bdf4ab23a8066a4205fd0
    Size: 3.22 MB
  40. rtla-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: e3cf0241ad8d9f620d1d052f66123e12
    SHA-256: d2e2efc696be7ae8605d5da879ca7d4b2e8d2332594183a17ca8eed8034ddabd
    Size: 1.87 MB
  41. rv-5.14.0-570.51.1.el9_6.x86_64.rpm
    MD5: 79ea9c420bdb4d70dee13542c062c036
    SHA-256: 22894345f1518e8a378baf088c8353fcabaf884252977f8e279bdedd96bb1f97
    Size: 1.83 MB