kernel-5.14.0-611.9.1.el9_7

エラータID: AXSA:2025-11506:95

リリース日: 
2025/12/11 Thursday - 10:21
題名: 
kernel-5.14.0-611.9.1.el9_7
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (CVE-2022-50087)
kernel: sunrpc: fix client side handling of tls alerts (CVE-2025-38571)
kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)
kernel: ipv6: sr: Fix MAC comparison to be constant-time (CVE-2025-39702)
kernel: x86/vmscape: Add conditional IBPB mitigation (CVE-2025-40300)
kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)
kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy (CVE-2022-50367)
kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849)
kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)
kernel: crypto: xts - Handle EBUSY correctly (CVE-2023-53494)
kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (CVE-2025-38351)
kernel: do_change_type(): refuse to operate on unmounted/not ours mounts (CVE-2025-38498)
kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697)
kernel: kernfs: Fix UAF in polling when open file is released (CVE-2025-39881)
kernel: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (CVE-2025-39982)
kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)
kernel: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue (CVE-2025-39983)
kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (CVE-2025-40047)
kernel: mm: slub: avoid wake up kswapd in set_track_prepare (CVE-2025-39843)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

CVE(s):
CVE-2025-38566
In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix handling of server side tls alerts Scott Mayhew discovered a security exploit in NFS over TLS in tls_alert_recv() due to its assumption it can read data from the msg iterator's kvec.. kTLS implementation splits TLS non-data record payload between the control message buffer (which includes the type such as TLS aler or TLS cipher change) and the rest of the payload (say TLS alert's level/description) which goes into the msg payload buffer. This patch proposes to rework how control messages are setup and used by sock_recvmsg(). If no control message structure is setup, kTLS layer will read and process TLS data record types. As soon as it encounters a TLS control message, it would return an error. At that point, NFS can setup a kvec backed msg buffer and read in the control message such as a TLS alert. Msg iterator can advance the kvec pointer as a part of the copy process thus we need to revert the iterator before calling into the tls_alert_recv.
CVE-2025-39718
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
CVE-2025-39702
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
CVE-2025-40300
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize these cases post-embargo. [ dhansen: elaborate on suboptimal IBPB solution ]
CVE-2025-39817
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare Observed on kernel 6.6 (present on master as well): BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0 Call trace: kasan_check_range+0xe8/0x190 __asan_loadN+0x1c/0x28 memcmp+0x98/0xd0 efivarfs_d_compare+0x68/0xd8 __d_lookup_rcu_op_compare+0x178/0x218 __d_lookup_rcu+0x1f8/0x228 d_alloc_parallel+0x150/0x648 lookup_open.isra.0+0x5f0/0x8d0 open_last_lookups+0x264/0x828 path_openat+0x130/0x3f8 do_filp_open+0x114/0x248 do_sys_openat2+0x340/0x3c0 __arm64_sys_openat+0x120/0x1a0 If dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become negative, leadings to oob. The issue can be triggered by parallel lookups using invalid filename: T1 T2 lookup_open ->lookup simple_lookup d_add // invalid dentry is added to hash list lookup_open d_alloc_parallel __d_lookup_rcu __d_lookup_rcu_op_compare hlist_bl_for_each_entry_rcu // invalid dentry can be retrieved ->d_compare efivarfs_d_compare // oob Fix it by checking 'guid' before cmp.
CVE-2023-53331
In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as valid"), initialization would assume a prz was valid after seeing that the buffer_size is zero (regardless of the buffer start position). This unchecked start value means it could be outside the bounds of the buffer, leading to future access panics when written to: sysdump_panic_event+0x3b4/0x5b8 atomic_notifier_call_chain+0x54/0x90 panic+0x1c8/0x42c die+0x29c/0x2a8 die_kernel_fault+0x68/0x78 __do_kernel_fault+0x1c4/0x1e0 do_bad_area+0x40/0x100 do_translation_fault+0x68/0x80 do_mem_abort+0x68/0xf8 el1_da+0x1c/0xc0 __raw_writeb+0x38/0x174 __memcpy_toio+0x40/0xac persistent_ram_update+0x44/0x12c persistent_ram_write+0x1a8/0x1b8 ramoops_pstore_write+0x198/0x1e8 pstore_console_write+0x94/0xe0 ... To avoid this, also check if the prz start is 0 during the initialization phase. If not, the next prz sanity check case will discover it (start > size) and zap the buffer back to a sane state. [kees: update commit log with backtrace and clarifications]
CVE-2022-50367
In the Linux kernel, the following vulnerability has been resolved: fs: fix UAF/GPF bug in nilfs_mdt_destroy In alloc_inode, inode_init_always() could return -ENOMEM if security_inode_alloc() fails, which causes inode->i_private uninitialized. Then nilfs_is_metadata_file_inode() returns true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(), which frees the uninitialized inode->i_private and leads to crashes(e.g., UAF/GPF). Fix this by moving security_inode_alloc just prior to this_cpu_inc(nr_inodes)
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2025-39849
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.
CVE-2025-39841
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.
CVE-2023-53494
In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request. However, as the caller of xts may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2025-38351
In the Linux kernel, the following vulnerability has been resolved: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush In KVM guests with Hyper-V hypercalls enabled, the hypercalls HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX allow a guest to request invalidation of portions of a virtual TLB. For this, the hypercall parameter includes a list of GVAs that are supposed to be invalidated. However, when non-canonical GVAs are passed, there is currently no filtering in place and they are eventually passed to checked invocations of INVVPID on Intel / INVLPGA on AMD. While AMD's INVLPGA silently ignores non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error(): invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000 WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482 invvpid_error+0x91/0xa0 [kvm_intel] Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary) RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel] Call Trace: vmx_flush_tlb_gva+0x320/0x490 [kvm_intel] kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm] kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm] Hyper-V documents that invalid GVAs (those that are beyond a partition's GVA space) are to be ignored. While not completely clear whether this ruling also applies to non-canonical GVAs, it is likely fine to make that assumption, and manual testing on Azure confirms "real" Hyper-V interprets the specification in the same way. Skip non-canonical GVAs when processing the list of address to avoid tripping the INVVPID failure. Alternatively, KVM could filter out "bad" GVAs before inserting into the FIFO, but practically speaking the only downside of pushing validation to the final processing is that doing so is suboptimal for the guest, and no well-behaved guest will request TLB flushes for non-canonical addresses.
CVE-2025-38498
In the Linux kernel, the following vulnerability has been resolved: do_change_type(): refuse to operate on unmounted/not ours mounts Ensure that propagation settings can only be changed for mounts located in the caller's mount namespace. This change aligns permission checking with the rest of mount(2).
CVE-2025-39697
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a race when updating an existing write After nfs_lock_and_join_requests() tests for whether the request is still attached to the mapping, nothing prevents a call to nfs_inode_remove_request() from succeeding until we actually lock the page group. The reason is that whoever called nfs_inode_remove_request() doesn't necessarily have a lock on the page group head. So in order to avoid races, let's take the page group lock earlier in nfs_lock_and_join_requests(), and hold it across the removal of the request in nfs_inode_remove_request().
CVE-2025-39881
In the Linux kernel, the following vulnerability has been resolved: kernfs: Fix UAF in polling when open file is released A use-after-free (UAF) vulnerability was identified in the PSI (Pressure Stall Information) monitoring mechanism: BUG: KASAN: slab-use-after-free in psi_trigger_poll+0x3c/0x140 Read of size 8 at addr ffff3de3d50bd308 by task systemd/1 psi_trigger_poll+0x3c/0x140 cgroup_pressure_poll+0x70/0xa0 cgroup_file_poll+0x8c/0x100 kernfs_fop_poll+0x11c/0x1c0 ep_item_poll.isra.0+0x188/0x2c0 Allocated by task 1: cgroup_file_open+0x88/0x388 kernfs_fop_open+0x73c/0xaf0 do_dentry_open+0x5fc/0x1200 vfs_open+0xa0/0x3f0 do_open+0x7e8/0xd08 path_openat+0x2fc/0x6b0 do_filp_open+0x174/0x368 Freed by task 8462: cgroup_file_release+0x130/0x1f8 kernfs_drain_open_files+0x17c/0x440 kernfs_drain+0x2dc/0x360 kernfs_show+0x1b8/0x288 cgroup_file_show+0x150/0x268 cgroup_pressure_write+0x1dc/0x340 cgroup_file_write+0x274/0x548 Reproduction Steps: 1. Open test/cpu.pressure and establish epoll monitoring 2. Disable monitoring: echo 0 > test/cgroup.pressure 3. Re-enable monitoring: echo 1 > test/cgroup.pressure The race condition occurs because: 1. When cgroup.pressure is disabled (echo 0 > cgroup.pressure), it: - Releases PSI triggers via cgroup_file_release() - Frees of->priv through kernfs_drain_open_files() 2. While epoll still holds reference to the file and continues polling 3. Re-enabling (echo 1 > cgroup.pressure) accesses freed of->priv epolling disable/enable cgroup.pressure fd=open(cpu.pressure) while(1) ... epoll_wait kernfs_fop_poll kernfs_get_active = true echo 0 > cgroup.pressure ... cgroup_file_show kernfs_show // inactive kn kernfs_drain_open_files cft->release(of); kfree(ctx); ... kernfs_get_active = false echo 1 > cgroup.pressure kernfs_show kernfs_activate_one(kn); kernfs_fop_poll kernfs_get_active = true cgroup_file_poll psi_trigger_poll // UAF ... end: close(fd) To address this issue, introduce kernfs_get_active_of() for kernfs open files to obtain active references. This function will fail if the open file has been released. Replace kernfs_get_active() with kernfs_get_active_of() to prevent further operations on released file descriptors.
CVE-2025-39982
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync This fixes the following UFA in hci_acl_create_conn_sync where a connection still pending is command submission (conn->state == BT_OPEN) maybe freed, also since this also can happen with the likes of hci_le_create_conn_sync fix it as well: BUG: KASAN: slab-use-after-free in hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861 Write of size 2 at addr ffff88805ffcc038 by task kworker/u11:2/9541 CPU: 1 UID: 0 PID: 9541 Comm: kworker/u11:2 Not tainted 6.16.0-rc7 #3 PREEMPT(full) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 Workqueue: hci3 hci_cmd_sync_work Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x230 mm/kasan/report.c:480 kasan_report+0x118/0x150 mm/kasan/report.c:593 hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245 Allocated by task 123736: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] __hci_conn_add+0x233/0x1b30 net/bluetooth/hci_conn.c:939 hci_conn_add_unset net/bluetooth/hci_conn.c:1051 [inline] hci_connect_acl+0x16c/0x4e0 net/bluetooth/hci_conn.c:1634 pair_device+0x418/0xa70 net/bluetooth/mgmt.c:3556 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x219/0x270 net/socket.c:727 sock_write_iter+0x258/0x330 net/socket.c:1131 new_sync_write fs/read_write.c:593 [inline] vfs_write+0x54b/0xa90 fs/read_write.c:686 ksys_write+0x145/0x250 fs/read_write.c:738 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 103680: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kfree+0x18e/0x440 mm/slub.c:4842 device_release+0x9c/0x1c0 kobject_cleanup lib/kobject.c:689 [inline] kobject_release lib/kobject.c:720 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x22b/0x480 lib/kobject.c:737 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline] hci_conn_del+0x8ff/0xcb0 net/bluetooth/hci_conn.c:1173 hci_conn_complete_evt+0x3c7/0x1040 net/bluetooth/hci_event.c:3199 hci_event_func net/bluetooth/hci_event.c:7477 [inline] hci_event_packet+0x7e0/0x1200 net/bluetooth/hci_event.c:7531 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/sour ---truncated---
CVE-2025-39971
In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().
CVE-2025-39983
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue This fixes the following UAF caused by not properly locking hdev when processing HCI_EV_NUM_COMP_PKTS: BUG: KASAN: slab-use-after-free in hci_conn_tx_dequeue+0x1be/0x220 net/bluetooth/hci_conn.c:3036 Read of size 4 at addr ffff8880740f0940 by task kworker/u11:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u11:0 Not tainted 6.16.0-rc7 #3 PREEMPT(full) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 Workqueue: hci1 hci_rx_work Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x230 mm/kasan/report.c:480 kasan_report+0x118/0x150 mm/kasan/report.c:593 hci_conn_tx_dequeue+0x1be/0x220 net/bluetooth/hci_conn.c:3036 hci_num_comp_pkts_evt+0x1c8/0xa50 net/bluetooth/hci_event.c:4404 hci_event_func net/bluetooth/hci_event.c:7477 [inline] hci_event_packet+0x7e0/0x1200 net/bluetooth/hci_event.c:7531 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245 Allocated by task 54: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] __hci_conn_add+0x233/0x1b30 net/bluetooth/hci_conn.c:939 le_conn_complete_evt+0x3d6/0x1220 net/bluetooth/hci_event.c:5628 hci_le_enh_conn_complete_evt+0x189/0x470 net/bluetooth/hci_event.c:5794 hci_event_func net/bluetooth/hci_event.c:7474 [inline] hci_event_packet+0x78c/0x1200 net/bluetooth/hci_event.c:7531 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245 Freed by task 9572: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kfree+0x18e/0x440 mm/slub.c:4842 device_release+0x9c/0x1c0 kobject_cleanup lib/kobject.c:689 [inline] kobject_release lib/kobject.c:720 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x22b/0x480 lib/kobject.c:737 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline] hci_conn_del+0x8ff/0xcb0 net/bluetooth/hci_conn.c:1173 hci_abort_conn_sync+0x5d1/0xdf0 net/bluetooth/hci_sync.c:5689 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245
CVE-2025-40047
In the Linux kernel, the following vulnerability has been resolved: io_uring/waitid: always prune wait queue entry in io_waitid_wait() For a successful return, always remove our entry from the wait queue entry list. Previously this was skipped if a cancelation was in progress, but this can race with another invocation of the wait queue entry callback.
CVE-2025-39843
In the Linux kernel, the following vulnerability has been resolved: mm: slub: avoid wake up kswapd in set_track_prepare set_track_prepare() can incur lock recursion. The issue is that it is called from hrtimer_start_range_ns holding the per_cpu(hrtimer_bases)[n].lock, but when enabled CONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare, and try to hold the per_cpu(hrtimer_bases)[n].lock. Avoid deadlock caused by implicitly waking up kswapd by passing in allocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the debug_objects_fill_pool() case. Inside stack depot they are processed by gfp_nested_mask(). Since ___slab_alloc() has preemption disabled, we mask out __GFP_DIRECT_RECLAIM from the flags there. The oops looks something like: BUG: spinlock recursion on CPU#3, swapper/3/0 lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3 Hardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT) Call trace: spin_bug+0x0 _raw_spin_lock_irqsave+0x80 hrtimer_try_to_cancel+0x94 task_contending+0x10c enqueue_dl_entity+0x2a4 dl_server_start+0x74 enqueue_task_fair+0x568 enqueue_task+0xac do_activate_task+0x14c ttwu_do_activate+0xcc try_to_wake_up+0x6c8 default_wake_function+0x20 autoremove_wake_function+0x1c __wake_up+0xac wakeup_kswapd+0x19c wake_all_kswapds+0x78 __alloc_pages_slowpath+0x1ac __alloc_pages_noprof+0x298 stack_depot_save_flags+0x6b0 stack_depot_save+0x14 set_track_prepare+0x5c ___slab_alloc+0xccc __kmalloc_cache_noprof+0x470 __set_page_owner+0x2bc post_alloc_hook[jt]+0x1b8 prep_new_page+0x28 get_page_from_freelist+0x1edc __alloc_pages_noprof+0x13c alloc_slab_page+0x244 allocate_slab+0x7c ___slab_alloc+0x8e8 kmem_cache_alloc_noprof+0x450 debug_objects_fill_pool+0x22c debug_object_activate+0x40 enqueue_hrtimer[jt]+0xdc hrtimer_start_range_ns+0x5f8 ...

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. kernel-5.14.0-611.9.1.el9_7.src.rpm
    MD5: af8470e83e57756cfc075022a3ecf0fa
    SHA-256: 47cc62bbe3b90f57fc2a94ddab194534526b725d7a2ded5120d89157ff0ae224
    Size: 143.94 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 1d144cd9ba1be1834df891adf7415947
    SHA-256: d72e4f7d6db047234ef5c384ca66f9fd417336e802e62f88e9cceef1decdbcc9
    Size: 1.08 MB
  2. kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm
    MD5: 4855257e47ae9cee6f9f134e2d62a157
    SHA-256: 52d8fd65dffd298af8971bbf7275fb2367261220d1248377d79c4c723b264808
    Size: 1.11 MB
  3. kernel-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: d73da2201e1b63280399237cb8fb3d14
    SHA-256: bbaf9a7e78b916af97bf16311bac91879f0ead2fc484a3533063900a97ae1314
    Size: 17.36 MB
  4. kernel-cross-headers-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: b4cc845f21b18cc76736da10d16557dd
    SHA-256: ee47014d1b20819b962875abe0df3e7b33f17829cf92076b861b7d71d552cf66
    Size: 8.03 MB
  5. kernel-debug-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 040d809938ddda25130fbdabc4fc224f
    SHA-256: 51c2a47c643b8eda8d33d38e8478f7f4bb41e9727cdf9ae669e0c28a4a6c8a1a
    Size: 1.08 MB
  6. kernel-debug-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 43ed1065f3e926b994a922d9171b4db4
    SHA-256: de5d77b7665c29b4c750ff7437f275956050ea962b81e2cde5c38c468a480a3d
    Size: 30.94 MB
  7. kernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: f1baa7bd79e06420acac5376963e39ac
    SHA-256: b00ec3b353f1f2350f6e217ad57b7c627b0f03d81a4d6533a10e86bad37f0477
    Size: 21.26 MB
  8. kernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 9b02501aca64aa4b7c6d72245fc39180
    SHA-256: e1d90987a29a453db1ae2b6c75d0e77d93acba6544f0fdc4fe00ef62b6a0648b
    Size: 1.08 MB
  9. kernel-debug-modules-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: db70267491008f18ee75ee6cc98ba8d7
    SHA-256: 609a3d1299c5df6a17f0a311d26930fbe91626bc2680906830fe00ec17537940
    Size: 69.34 MB
  10. kernel-debug-modules-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 19227b1029134c5796fb245698137ec6
    SHA-256: fa669617a9e5300a5467613b24c6f87bef964c3f77b88dea12470a70a89122bd
    Size: 49.40 MB
  11. kernel-debug-modules-extra-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 62f53faacc8434fe955cafccec3a44a5
    SHA-256: 7363c74ca1299e0196adbdc4b69eec86bc6a74aee8c786f9c49e4bf00af5288d
    Size: 1.86 MB
  12. kernel-debug-uki-virt-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 886a93191987bf32056ff28169e9a200
    SHA-256: 18d90d2e06ea8c5859e30586f687501e8e46de6ebfba92743451046cb9e7e4fd
    Size: 85.78 MB
  13. kernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: d51a3bf6cbaff973ad75ba80e9e1adf0
    SHA-256: e27fd562c52de64d739352a4c932c1158173ebe9cfb3448086933cff336dd0b3
    Size: 21.10 MB
  14. kernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: a23a7405439dfcf5b3bb47948f6a16f4
    SHA-256: ec33b6ceb8f8974ad54b633c861f6e1783c7f39942dfe6fb663e655412bc865c
    Size: 1.08 MB
  15. kernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm
    MD5: 7aae9c80dc559e2ae56ab3dc72ce6403
    SHA-256: bf0299a1b2a49ec7e1c5c903e55dba3e58ead09c1ade0790f24301466b7a6acf
    Size: 38.82 MB
  16. kernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: e21c91f379fa7f563a52574d8eb3740f
    SHA-256: 95380ff17d78f8a3dd6e403ca7f1bf0990fb1d97202bcd518452b037f5cdd1b7
    Size: 2.84 MB
  17. kernel-modules-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 53bc6be28ce536531797bca7d6f5a3ec
    SHA-256: e58f76a3003f9dfcfa0536127a1beef2394b3e8cf913d91b0d11f1929d1f9dbf
    Size: 39.74 MB
  18. kernel-modules-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 2b93d3f7383037243ef43a02acd66967
    SHA-256: 557c90926e78e2f60ca8e4aedd0d01122d10b9509dc25954ad6c53a04f04dd54
    Size: 30.90 MB
  19. kernel-modules-extra-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: f320e1bd04b06b668d977c81178238c0
    SHA-256: 30136ac2ef54e8f81aa46155fa391e3994161601a52359b1da2ebe52166d292a
    Size: 1.51 MB
  20. kernel-rt-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: b7e239225291b8b186649300c5bb6ee2
    SHA-256: e225ae01f713205f1a3e16c0ecb4593458229424fbc1820fdd195203c9deeef8
    Size: 1.08 MB
  21. kernel-rt-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: d42ae84edb4fcd0ada4674be798e6451
    SHA-256: 606d84579cddac32699f8b5fe7dfcb881f8b5f07ff4868cf8196ee62d59a2222
    Size: 17.27 MB
  22. kernel-rt-debug-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 880021c2942d8057709f061ad6abdabf
    SHA-256: 6ff09756ed969146f15ccdd9f686b425663bfd7977414e892d00deee324a1680
    Size: 1.08 MB
  23. kernel-rt-debug-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: fc544382ba063ec303f6858cfcb75f0d
    SHA-256: 3c8f3bc611fb0110f350acddc0a77e5cd013fb02fed3cd27e1127fbb36942be0
    Size: 18.69 MB
  24. kernel-rt-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: b56f560462557b833fcf7aac1cfd2eab
    SHA-256: 0afd0226d868438ce7ec5e7c76b6b3008cfd3ff2ac0289f8b97e05cf2fdacc20
    Size: 21.21 MB
  25. kernel-rt-debug-modules-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: c83e8c081a19deb0d7db5bfc8150fd35
    SHA-256: 46a37c45e67869fcaaf4b3d2ae52e35a85f7a014a50f913bb3cb22867def27a1
    Size: 41.30 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 3be8a29a5ad5de5520ed2e23795499ff
    SHA-256: d94c71fd7fbc6d078faf402453cf831ef260acb8e7102af0e991568dc03eca09
    Size: 32.06 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 6ad033f4b076274c9e1c99a4319ac363
    SHA-256: 7a030defc810500f3ddb17256202848f0099fae3b7a812ccec3ad9d82e6c4d4f
    Size: 1.53 MB
  28. kernel-rt-devel-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 6fda7cf2e21046bcfa07ba8abf35dcbf
    SHA-256: e0d6fd7397a29c022a88439f0196d2a0c1ab90557f9a2c035f68413ef909bec1
    Size: 21.08 MB
  29. kernel-rt-modules-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: b7bc0d4fc2b1a2dea278a91bfc53a4f3
    SHA-256: 8d5e762f8c586ca65e8f00aebf107914a0d0917ed2881c42800d854b0f81de3a
    Size: 39.80 MB
  30. kernel-rt-modules-core-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 4e3c7a2c9bdde8748630cf3dfb8f7c51
    SHA-256: dc05cf4d44778f11c5646cb67cda2339b6045464765e54333b05163e91ab50c9
    Size: 30.97 MB
  31. kernel-rt-modules-extra-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: f095b4e9918049222d113563aab7d48c
    SHA-256: c13d18e4cb44fb3035ce665dae39ea89a4536f2f005beef297b1f3c1b1b6df9d
    Size: 1.51 MB
  32. kernel-tools-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: c9e7b10912e4639770b6e6023b8bb23e
    SHA-256: 07bb90c4a2e29484e7974e8549bd6af20845bf7972d8a3abbdbc330f7c901d52
    Size: 1.37 MB
  33. kernel-tools-libs-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 09a47b25a4145d3e5f8080781886ef95
    SHA-256: c53a40b65d7f42a3225204bda03c23ad93476597f12c61d9d8be20ed7d316057
    Size: 1.10 MB
  34. kernel-tools-libs-devel-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 6c46f5a2f97308c34f07ea400e2312fd
    SHA-256: a45461b2fd29d69bea5eab8b26d0466dc7c4016e53a4558810a43f451487ec4c
    Size: 1.09 MB
  35. kernel-uki-virt-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 4a1132a995d3dc7e0ade79a2f0187610
    SHA-256: 4145f6e3685bc87ba551fa424c1cd32cffe0c059c40d8966c140884a2472d6e3
    Size: 63.93 MB
  36. kernel-uki-virt-addons-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 5ba2f1dfaf252bca29590470be0e793b
    SHA-256: 30e6cb5a21e31cf4f6a037b00eb4a6b1edcbac43fb15a36a3116ad4b92245da8
    Size: 1.11 MB
  37. libperf-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: d1bc6d3f0ce458a56fdc2e8ae96b5394
    SHA-256: c4dac75bd8405b39643464d700b4e4c2b3a4df417d269c13ae14c7b39fac7f84
    Size: 1.10 MB
  38. perf-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 3d597f71ca4a0c7a099a712c087bba54
    SHA-256: def4f8fa4d433b19adbde9e1c5f0f46d85eefea46203a5305cd07372fa7ab64f
    Size: 3.34 MB
  39. python3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 9eadd4863b2bebe6194c77e8bbf04a91
    SHA-256: c6334e3c6f7522936452a15cd88d12054b9a1fea5508aa88e697f98bd5eb8992
    Size: 2.51 MB
  40. rtla-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: dcd02677ed9903f35aa6300b10207c79
    SHA-256: abf0337f6db38a93e14c550325a97976485de4f7fc15cdc0c397724c36646938
    Size: 1.15 MB
  41. rv-5.14.0-611.9.1.el9_7.x86_64.rpm
    MD5: 05b32f637e55251d8075ea9e0e68a2e0
    SHA-256: 341d85adf00ed93186ed7426342bd4c54b94cd55136d5a15187021fcb4b1014a
    Size: 1.10 MB