{"schema_version":"1.7.2","id":"OESA-2025-2123","modified":"2025-09-05T12:41:59Z","published":"2025-09-05T12:41:59Z","upstream":["CVE-2025-38581"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Fix crash when rebind ccp device for ccp.ko\n\nWhen CONFIG_CRYPTO_DEV_CCP_DEBUGFS is enabled, rebinding\nthe ccp device causes the following crash:\n\n$ echo &apos;0000:0a:00.2&apos; &gt; /sys/bus/pci/drivers/ccp/unbind\n$ echo &apos;0000:0a:00.2&apos; &gt; /sys/bus/pci/drivers/ccp/bind\n\n[  204.976930] BUG: kernel NULL pointer dereference, address: 0000000000000098\n[  204.978026] #PF: supervisor write access in kernel mode\n[  204.979126] #PF: error_code(0x0002) - not-present page\n[  204.980226] PGD 0 P4D 0\n[  204.981317] Oops: Oops: 0002 [#1] SMP NOPTI\n...\n[  204.997852] Call Trace:\n[  204.999074]  &lt;TASK&gt;\n[  205.000297]  start_creating+0x9f/0x1c0\n[  205.001533]  debugfs_create_dir+0x1f/0x170\n[  205.002769]  ? srso_return_thunk+0x5/0x5f\n[  205.004000]  ccp5_debugfs_setup+0x87/0x170 [ccp]\n[  205.005241]  ccp5_init+0x8b2/0x960 [ccp]\n[  205.006469]  ccp_dev_init+0xd4/0x150 [ccp]\n[  205.007709]  sp_init+0x5f/0x80 [ccp]\n[  205.008942]  sp_pci_probe+0x283/0x2e0 [ccp]\n[  205.010165]  ? srso_return_thunk+0x5/0x5f\n[  205.011376]  local_pci_probe+0x4f/0xb0\n[  205.012584]  pci_device_probe+0xdb/0x230\n[  205.013810]  really_probe+0xed/0x380\n[  205.015024]  __driver_probe_device+0x7e/0x160\n[  205.016240]  device_driver_attach+0x2f/0x60\n[  205.017457]  bind_store+0x7c/0xb0\n[  205.018663]  drv_attr_store+0x28/0x40\n[  205.019868]  sysfs_kf_write+0x5f/0x70\n[  205.021065]  kernfs_fop_write_iter+0x145/0x1d0\n[  205.022267]  vfs_write+0x308/0x440\n[  205.023453]  ksys_write+0x6d/0xe0\n[  205.024616]  __x64_sys_write+0x1e/0x30\n[  205.025778]  x64_sys_call+0x16ba/0x2150\n[  205.026942]  do_syscall_64+0x56/0x1e0\n[  205.028108]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[  205.029276] RIP: 0033:0x7fbc36f10104\n[  205.030420] Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 e1 08 2e 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 f3 c3 66 90 41 54 55 49 89 d4 53 48 89 f5\n\nThis patch sets ccp_debugfs_dir to NULL after destroying it in\nccp5_debugfs_destroy, allowing the directory dentry to be\nrecreated when rebinding the ccp device.\n\nTested on AMD Ryzen 7 1700X.(CVE-2025-38581)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"kernel","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2509.1.0.0342.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["bpftool-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","bpftool-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-debugsource-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-devel-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-source-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-tools-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","kernel-tools-devel-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","perf-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","python2-perf-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","python2-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","python3-perf-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm","python3-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.aarch64.rpm"],"src":["kernel-4.19.90-2509.1.0.0342.oe2003sp4.src.rpm"],"x86_64":["bpftool-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","bpftool-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-debugsource-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-devel-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-source-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-tools-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","kernel-tools-devel-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","perf-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","python2-perf-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","python2-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","python3-perf-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm","python3-perf-debuginfo-4.19.90-2509.1.0.0342.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38581"}],"database_specific":{"severity":"Medium"}}
