kernel-5.14.0-570.52.1.el9_6
エラータID: AXSA:2025-10985:80
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
* kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2025-38556
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
CVE-2025-38614
In the Linux kernel, the following vulnerability has been resolved: eventpoll: Fix semi-unbounded recursion Ensure that epoll instances can never form a graph deeper than EP_MAX_NESTS+1 links. Currently, ep_loop_check_proc() ensures that the graph is loop-free and does some recursion depth checks, but those recursion depth checks don't limit the depth of the resulting tree for two reasons: - They don't look upwards in the tree. - If there are multiple downwards paths of different lengths, only one of the paths is actually considered for the depth check since commit 28d82dc1c4ed ("epoll: limit paths"). Essentially, the current recursion depth check in ep_loop_check_proc() just serves to prevent it from recursing too deeply while checking for loops. A more thorough check is done in reverse_path_check() after the new graph edge has already been created; this checks, among other things, that no paths going upwards from any non-epoll file with a length of more than 5 edges exist. However, this check does not apply to non-epoll files. As a result, it is possible to recurse to a depth of at least roughly 500, tested on v6.15. (I am unsure if deeper recursion is possible; and this may have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion problem").) To fix it: 1. In ep_loop_check_proc(), note the subtree depth of each visited node, and use subtree depths for the total depth calculation even when a subtree has already been visited. 2. Add ep_get_upwards_depth_proc() for similarly determining the maximum depth of an upwards walk. 3. In ep_loop_check(), use these values to limit the total path length between epoll nodes to EP_MAX_NESTS edges.
CVE-2025-39757
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
In the Linux kernel, the following vulnerability has been resolved: eventpoll: Fix semi-unbounded recursion Ensure that epoll instances can never form a graph deeper than EP_MAX_NESTS+1 links. Currently, ep_loop_check_proc() ensures that the graph is loop-free and does some recursion depth checks, but those recursion depth checks don't limit the depth of the resulting tree for two reasons: - They don't look upwards in the tree. - If there are multiple downwards paths of different lengths, only one of the paths is actually considered for the depth check since commit 28d82dc1c4ed ("epoll: limit paths"). Essentially, the current recursion depth check in ep_loop_check_proc() just serves to prevent it from recursing too deeply while checking for loops. A more thorough check is done in reverse_path_check() after the new graph edge has already been created; this checks, among other things, that no paths going upwards from any non-epoll file with a length of more than 5 edges exist. However, this check does not apply to non-epoll files. As a result, it is possible to recurse to a depth of at least roughly 500, tested on v6.15. (I am unsure if deeper recursion is possible; and this may have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion problem").) To fix it: 1. In ep_loop_check_proc(), note the subtree depth of each visited node, and use subtree depths for the total depth calculation even when a subtree has already been visited. 2. Add ep_get_upwards_depth_proc() for similarly determining the maximum depth of an upwards walk. 3. In ep_loop_check(), use these values to limit the total path length between epoll nodes to EP_MAX_NESTS edges.
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.
N/A
SRPMS
- kernel-5.14.0-570.52.1.el9_6.src.rpm
MD5: 8e4f73e05f1a80cffd1a577a7e02688b
SHA-256: 82c3f7ba068349d136fcdc813c2903eca6c7be6061351b0e598fe780bdf57de8
Size: 142.62 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 87082df62e5189827787114d7d6d4035
SHA-256: a4d2cec6f64f4d9eabe9b834303bf7f05f145ae60bc95d0c3747792408d08538
Size: 1.82 MB - kernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm
MD5: 1fafd86d84a1811d58c560b46dd011a4
SHA-256: 30068dfb3cb2f09062c63a71daee26958aeadeea526b6976ad236d22ce746c2e
Size: 1.84 MB - kernel-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: ce103bec9f2c8a816220d0f1f8312227
SHA-256: 41b70ed443af35c30badc87d62042ee2c29f2e131ed46dd3cd6b4afd55a3a5cf
Size: 17.89 MB - kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 30a03aba954a9d9c95100955e9f3f875
SHA-256: cdaec4ff8fa61aa70a6dc53212af7c9ec67711ff49f3f2e1f9bdeb523b531339
Size: 8.68 MB - kernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 7fcbe6878d56b7ab475bc3accadb8cd8
SHA-256: a3bfdb108c0d3bdab69860b6747c18898dbd73263dd9d11dcd3db2c1f58ceb79
Size: 1.82 MB - kernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: ae2ed2f939966842ba06633a6864ea69
SHA-256: c2527d8e72c6846baab600e2e9d96546a992c83ea7b13901ce778aad55a3a95b
Size: 31.33 MB - kernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 07c3f30180494133e622c9e9a81a6ae4
SHA-256: a803429952a825293e51216de225994d522652feff89ae0db4bc3a0bc858c4cf
Size: 21.81 MB - kernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: e1881f5c0b77b831cb0c1ac827ed9681
SHA-256: 0bdff4e15b6dc6368ee73ead5680a8ddde252a70c82b53622563ec52b7077348
Size: 1.82 MB - kernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: a7d0bab0c2f2d863f56c7c3921bfa9de
SHA-256: fbb4e70897c70588fee9006e1195cc586ecfca2f0fdc8d43f43840ab2da5e661
Size: 67.57 MB - kernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 8cf41eea09ed61660e9a5ef7abba6fd6
SHA-256: 6f63a9bfafac24fcc15e41f7a19cf295e762acb8772d2ef7e52e945fbf726f38
Size: 48.94 MB - kernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: fc9824d713c9907201e7b9a5318818d3
SHA-256: 547933fd5cc7a615798812be9923a8265b95285db9732293b2a23281b1bacfc6
Size: 2.59 MB - kernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 4df9775cc434128664901d3e0ec55e3e
SHA-256: 38427567f5ff0321bc1e5b0f70bff6c685eb2c30e1451096f3e2afc1d9d0fcc2
Size: 84.52 MB - kernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 68cbf108c47084235ec35e3916f09dbb
SHA-256: a02d60561b84cc8e5027bd0434c2e8a269694fe5107fd9227cd5074143736402
Size: 21.64 MB - kernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 4976c241aab679ad01cbca3ac41c2f02
SHA-256: 74d2a0014ed189b03f715d122a9b9c00a67bfe6d85327fa85b963ee7713af8e7
Size: 1.82 MB - kernel-doc-5.14.0-570.52.1.el9_6.noarch.rpm
MD5: d0704a14157295ca9fda2611151b08a3
SHA-256: dac31e342a4668f47bfb9111cc6180f11033fcfd73d400ccb4b90add4d5e6115
Size: 37.97 MB - kernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 85975d3d6f0137243249ced406efe14c
SHA-256: 9d200f0fa74bd150551a5f0dd38e37cfcb644cf46e3fed3ce8847d3a02ebe832
Size: 3.55 MB - kernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: f140df553db9077c703818b814502799
SHA-256: 6c548084723617aba56a2b44fbcb7bb4afa4c8604521869826630cf00b3c07e7
Size: 39.05 MB - kernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: c554f212e2d48e220f55a670957f6f97
SHA-256: d5be61686a8beb9a4107aa863cc1b3d3738586d4dea60b269b921a51445a4b79
Size: 30.93 MB - kernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 95b2dcf85a8ace7d808d47e7ed9b981b
SHA-256: 6a3608fe4cef2af1657ab86b7140546f0c11817d07ec2452dd08df6c200bcaa4
Size: 2.24 MB - kernel-rt-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 9d36995f427a682c141ae372bf02d0f5
SHA-256: 4c776f2c4db647ad1c6154e7518a684f6f195f96dd98faf73e0c8419a60fc559
Size: 1.82 MB - kernel-rt-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 0163d4554d4e4e33034281a7a2379a67
SHA-256: 1383373d8017a87d24c0f69fce647715190f74236837e2e31d3c1029bd1434a3
Size: 17.79 MB - kernel-rt-debug-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 12f8959d93db1e58a449e96aa56cb56e
SHA-256: 5f5b532cd21633e9c43f44379f725535b06ec50c13dda4d898ca772a3cb50baf
Size: 1.82 MB - kernel-rt-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: e33c457331fe52421211f8d965a65d1d
SHA-256: 61b96bd4a954958f582e5b0b10114aa994ba10e6e3d5bfd7451f757cae359537
Size: 19.19 MB - kernel-rt-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 880793760d1da96e5e17b18fc0e4c1ab
SHA-256: 4bc52a082ff9ec15228699e2de93ceb75d93f89003f34a395e6f1feb760a62e3
Size: 21.77 MB - kernel-rt-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: ac1beae2bbee7309c0e356e5f6c258d3
SHA-256: cb61d8c84a73b8d3cb0f90fbe567fa7987e77248bd1d5887b3060c3173abf231
Size: 40.46 MB - kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: b0562972166079ed3e4159a7d62c76aa
SHA-256: 5ef85304353dc35719a2cac4875608abf15ac8ead9086493f93b520c596551e4
Size: 31.35 MB - kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: dee96df5e2370cc7e302acdd940391fb
SHA-256: af58d40fc21b746bd357f4aab741caabb2fda3ea9bd6caa6be5d061201d749d4
Size: 2.26 MB - kernel-rt-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: cf939cad83ad4a62c4c32a443d73dc36
SHA-256: 37c0cefa15fe9779603f514fcde0c3b29a1d092b531ed10c33266643213ad3f1
Size: 21.62 MB - kernel-rt-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 4c43f095dbe972ce77d2fe8ca8ce9bf1
SHA-256: fef54fd2bdadafb402a68373af92f100519e3a2493bc383d64164bbbb0ab60f0
Size: 39.06 MB - kernel-rt-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 7d15e1f3609bfcad29df77024666f5c3
SHA-256: bacd363494cf3d13636738fb45ff51f092924776c66d9546ca1f04af2005dce4
Size: 30.30 MB - kernel-rt-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 125220ab2ff70bd46f4ba3e82cc001ae
SHA-256: d6c22059c1cc89d2822b654817ac0a219e6a286fb6e7de28e0801999833d440f
Size: 2.24 MB - kernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 061846b78744534e609c8ff30d812b3b
SHA-256: 2d2ae9462c41cde62abbe065ae740978ea4cc72abb1f77046702885031d301c1
Size: 2.10 MB - kernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 648d531a8d4c00e456e2cca630100768
SHA-256: 331597387e44d6c1274ab787695552f8946d0749d9bb805820c5c9046d31e4ae
Size: 1.83 MB - kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 5f8748fc1628db8920d6371706767b48
SHA-256: 60212b31cb0c504529d1f6dddb8322350f92592684ff348b0ff5bda69fc3efa7
Size: 1.82 MB - kernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 879919dc855528aa902bb99ff44f8d5b
SHA-256: f73ed4777ed48ae479066a0736c82a27114ff5e86d8eb6d111acf3803c42cb2b
Size: 63.18 MB - kernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 11abcc7c81d94e7b36167645d34ce053
SHA-256: b3846978e5216d37f8bab3f42737acea30dae3859178516c077bdedeee2c702a
Size: 1.84 MB - libperf-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: a588bcf5bfa95325010a650b930b84dc
SHA-256: e5690352524348cb65848e7e541691e626410a0866090c390543e111b9b6b4be
Size: 1.84 MB - perf-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 5ba9ea6838c79e277fecb56b3f2314d2
SHA-256: d6f3099515800e8087ed65dd7a7f0633feb328afae4aea469be22f2c400b8c68
Size: 4.05 MB - python3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: db42064d81fdfe05a9100864ce2e857f
SHA-256: eebfbf11645d986202285cc77f0ef181737a5bd29f26b4b5b9afe5c39dcbf4be
Size: 3.22 MB - rtla-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: ce41cc7abcf8558de2624dda67c499ff
SHA-256: 8b65f38266ea3a0588c17ae5daebcb050ad8bd9bc2d4d4fdd7b89555c5c25c9a
Size: 1.87 MB - rv-5.14.0-570.52.1.el9_6.x86_64.rpm
MD5: 3458fc42f1416c6e4a95964d626e5082
SHA-256: 8bf7faf47a71d1434ace4faa2f3bfcbc850eb516dc431338a98a2d565f0fce49
Size: 1.83 MB