OESA-2025-2123

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2123
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2123.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2123
Upstream
Published
2025-09-05T12:41:59Z
Modified
2025-09-05T13:03:28.976426Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix crash when rebind ccp device for ccp.ko

When CONFIGCRYPTODEVCCPDEBUGFS is enabled, rebinding the ccp device causes the following crash:

$ echo '0000:0a:00.2' > /sys/bus/pci/drivers/ccp/unbind $ echo '0000:0a:00.2' > /sys/bus/pci/drivers/ccp/bind

[ 204.976930] BUG: kernel NULL pointer dereference, address: 0000000000000098 [ 204.978026] #PF: supervisor write access in kernel mode [ 204.979126] #PF: errorcode(0x0002) - not-present page [ 204.980226] PGD 0 P4D 0 [ 204.981317] Oops: Oops: 0002 [#1] SMP NOPTI ... [ 204.997852] Call Trace: [ 204.999074] <TASK> [ 205.000297] startcreating+0x9f/0x1c0 [ 205.001533] debugfscreatedir+0x1f/0x170 [ 205.002769] ? srsoreturnthunk+0x5/0x5f [ 205.004000] ccp5debugfssetup+0x87/0x170 [ccp] [ 205.005241] ccp5init+0x8b2/0x960 [ccp] [ 205.006469] ccpdevinit+0xd4/0x150 [ccp] [ 205.007709] spinit+0x5f/0x80 [ccp] [ 205.008942] sppciprobe+0x283/0x2e0 [ccp] [ 205.010165] ? srsoreturnthunk+0x5/0x5f [ 205.011376] localpciprobe+0x4f/0xb0 [ 205.012584] pcideviceprobe+0xdb/0x230 [ 205.013810] reallyprobe+0xed/0x380 [ 205.015024] _driverprobedevice+0x7e/0x160 [ 205.016240] devicedriverattach+0x2f/0x60 [ 205.017457] bindstore+0x7c/0xb0 [ 205.018663] drvattrstore+0x28/0x40 [ 205.019868] sysfskfwrite+0x5f/0x70 [ 205.021065] kernfsfopwriteiter+0x145/0x1d0 [ 205.022267] vfswrite+0x308/0x440 [ 205.023453] ksyswrite+0x6d/0xe0 [ 205.024616] _x64syswrite+0x1e/0x30 [ 205.025778] x64syscall+0x16ba/0x2150 [ 205.026942] dosyscall64+0x56/0x1e0 [ 205.028108] entrySYSCALL64after_hwframe+0x76/0x7e [ 205.029276] RIP: 0033:0x7fbc36f10104 [ 205.030420] Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 e1 08 2e 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 f3 c3 66 90 41 54 55 49 89 d4 53 48 89 f5

This patch sets ccpdebugfsdir to NULL after destroying it in ccp5debugfsdestroy, allowing the directory dentry to be recreated when rebinding the ccp device.

Tested on AMD Ryzen 7 1700X.(CVE-2025-38581)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.90-2509.1.0.0342.oe2003sp4

Ecosystem specific

{
    "aarch64": [
        "bpftool-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "bpftool-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-debugsource-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-devel-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-source-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-tools-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-tools-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "kernel-tools-devel-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "perf-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "python2-perf-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "python2-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "python3-perf-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm",
        "python3-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm"
    ],
    "x86_64": [
        "bpftool-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "bpftool-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-debugsource-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-devel-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-source-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-tools-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-tools-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "kernel-tools-devel-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "perf-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "python2-perf-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "python2-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "python3-perf-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm",
        "python3-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm"
    ],
    "src": [
        "kernel-4.19.90-2509.1.0.0342.oe2003sp4.src.rpm"
    ]
}