OESA-2025-1923

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1923
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1923.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1923
Upstream
Published
2025-08-01T13:02:35Z
Modified
2025-08-12T05:50:39.873537Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

ipc: fix to protect IPCS lookups using RCU

syzbot reported that it discovered a use-after-free vulnerability, [0]

In the Linux kernel, the following vulnerability has been resolved:

mpls: Use rcudereferencertnl() in mplsrouteinput_rcu().

As syzbot reported [0], mplsrouteinputrcu() can be called from mplsgetroute(), where is under RTNL.

net->mpls.platform_label is only updated under RTNL.

Let's use rcudereferencertnl() in mplsrouteinput_rcu() to silence the splat.

6.15.0-rc7-syzkaller-00082-g5cdb2c77c4c3 #0 Not tainted


net/mpls/afmpls.c:84 suspicious rcudereference_check() usage!

other info that might help us debug this:

rcuscheduleractive = 2, debuglocks = 1 1 lock held by syz.2.4451/17730: #0: ffffffff9012a3e8 (rtnlmutex){+.+.}-{4:4}, at: rtnllock net/core/rtnetlink.c:80 [inline] #0: ffffffff9012a3e8 (rtnlmutex){+.+.}-{4:4}, at: rtnetlinkrcvmsg+0x371/0xe90 net/core/rtnetlink.c:6961

stack backtrace: CPU: 1 UID: 0 PID: 17730 Comm: syz.2.4451 Not tainted 6.15.0-rc7-syzkaller-00082-g5cdb2c77c4c3 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: <TASK> dumpstack lib/dumpstack.c:94 [inline] dumpstacklvl+0x16c/0x1f0 lib/dumpstack.c:120 lockdeprcususpicious+0x166/0x260 kernel/locking/lockdep.c:6865 mplsrouteinputrcu+0x1d4/0x200 net/mpls/afmpls.c:84 mplsgetroute+0x621/0x1ea0 net/mpls/afmpls.c:2381 rtnetlinkrcvmsg+0x3c9/0xe90 net/core/rtnetlink.c:6964 netlinkrcvskb+0x16d/0x440 net/netlink/afnetlink.c:2534 netlinkunicastkernel net/netlink/afnetlink.c:1313 [inline] netlinkunicast+0x53a/0x7f0 net/netlink/afnetlink.c:1339 netlinksendmsg+0x8d1/0xdd0 net/netlink/afnetlink.c:1883 socksendmsgnosec net/socket.c:712 [inline] _socksendmsg net/socket.c:727 [inline] _syssendmsg+0xa98/0xc70 net/socket.c:2566 _syssendmsg+0x134/0x1d0 net/socket.c:2620 _syssendmmsg+0x200/0x420 net/socket.c:2709 _dosyssendmmsg net/socket.c:2736 [inline] _sesyssendmmsg net/socket.c:2733 [inline] _x64syssendmmsg+0x9c/0x100 net/socket.c:2733 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xcd/0x230 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f RIP: 0033:0x7f0a2818e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f0a28f52038 EFLAGS: 00000246 ORIGRAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0a283b5fa0 RCX: 00007f0a2818e969 RDX: 0000000000000003 RSI: 0000200000000080 RDI: 0000000000000003 RBP: 00007f0a28210ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f0a283b5fa0 R15: 00007ffce5e9f268 </TASK>(CVE-2025-38324)

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: do not index invalid pin_assignments

A poorly implemented DisplayPort Alt Mode port partner can indicate that its pin assignment capabilities are greater than the maximum value, DPPINASSIGNF. In this case, calls to pinassignment_show will cause a BRK exception due to an out of bounds array access.

Prevent for loop in pinassignmentshow from accessing invalid values in pinassignments by adding DPPINASSIGNMAX value in typecdp.h and using i < DPPINASSIGNMAX as a loop condition.(CVE-2025-38391)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.90-2507.4.0.0337.oe2003sp4

Ecosystem specific

{
    "x86_64": [
        "bpftool-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "bpftool-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-debugsource-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-devel-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-source-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-tools-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-tools-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "kernel-tools-devel-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "perf-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "perf-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "python2-perf-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "python2-perf-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "python3-perf-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm",
        "python3-perf-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.x86_64.rpm"
    ],
    "src": [
        "kernel-4.19.90-2507.4.0.0337.oe2003sp4.src.rpm"
    ],
    "aarch64": [
        "bpftool-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "bpftool-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-debugsource-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-devel-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-source-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-tools-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-tools-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "kernel-tools-devel-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "perf-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "perf-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "python2-perf-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "python2-perf-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "python3-perf-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm",
        "python3-perf-debuginfo-4.19.90-2507.4.0.0337.oe2003sp4.aarch64.rpm"
    ]
}