OESA-2025-1015

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1015
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1015.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1015
Upstream
Published
2025-01-03T12:54:39Z
Modified
2025-08-12T05:46:28.022256Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Fix deadlock in SGX NUMA node search When the current node doesn't have an EPC section configured by firmware and all other EPC sections are used up, CPU can get stuck inside the while loop that looks for an available EPC page from remote nodes indefinitely, leading to a soft lockup. Note how nidofcurrent will never be equal to nid in that while loop because nidofcurrent is not set in sgxnumamask. Also worth mentioning is that it's perfectly fine for the firmware not to setup an EPC section on a node. While setting up an EPC section on each node can enhance performance, it is not a requirement for functionality. Rework the loop to start and end on a node that has SGX memory. This avoids the deadlock looking for the current SGX-lacking node to show up in the loop when it never will.(CVE-2024-49856)

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix user-after-free from session log off There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add sessionlock when setting SMB2SESSION_EXPIRED and referece count to session struct not to free session while it is being used.(CVE-2024-50086)

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpgprecalculateline() blindly rescales the buffer even when scaledwitdh is equal to zero. If this ever happens, this will cause a division by zero. Instead, add a WARNON_ONCE() to trigger such cases and return without doing any precalculation.(CVE-2024-50287)

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.(CVE-2024-53150)

In the Linux kernel, the following vulnerability has been resolved: ocfs2: free inode when ocfs2getinitinode() fails syzbot is reporting busy inodes after unmount, for commit 9c89fe0af826 ("ocfs2: Handle error from dquotinitialize()") forgot to call iput() when newinode() succeeded and dquotinitialize() failed.(CVE-2024-56630)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.0-244.0.0.146.oe2203sp3

Ecosystem specific

{
    "x86_64": [
        "kernel-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-debuginfo-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-debugsource-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-devel-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-headers-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-source-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-tools-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-tools-debuginfo-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "kernel-tools-devel-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "perf-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "perf-debuginfo-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "python3-perf-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm",
        "python3-perf-debuginfo-5.10.0-244.0.0.146.oe2203sp3.x86_64.rpm"
    ],
    "src": [
        "kernel-5.10.0-244.0.0.146.oe2203sp3.src.rpm"
    ],
    "aarch64": [
        "kernel-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-debuginfo-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-debugsource-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-devel-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-headers-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-source-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-tools-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-tools-debuginfo-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "kernel-tools-devel-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "perf-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "perf-debuginfo-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "python3-perf-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm",
        "python3-perf-debuginfo-5.10.0-244.0.0.146.oe2203sp3.aarch64.rpm"
    ]
}