{"schema_version":"1.7.2","id":"OESA-2025-2271","modified":"2025-09-12T14:25:51Z","published":"2025-09-12T14:25:51Z","upstream":["CVE-2025-38498","CVE-2025-39689"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved: do_change_type() now refuses to operate on unmounted mounts or mounts not belonging to the caller&apos;s mount namespace. This change aligns permission checking with the rest of mount(2).(CVE-2025-38498)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn&apos;t have to differentiate when to free the\niterator&apos;s hash between writers and readers.(CVE-2025-39689)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"kernel","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2509.4.0.0343.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["bpftool-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","bpftool-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-debugsource-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-devel-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-source-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-tools-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","kernel-tools-devel-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","perf-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","perf-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","python2-perf-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","python2-perf-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","python3-perf-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm","python3-perf-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.aarch64.rpm"],"src":["kernel-4.19.90-2509.4.0.0343.oe2003sp4.src.rpm"],"x86_64":["bpftool-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","bpftool-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-debugsource-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-devel-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-source-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-tools-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","kernel-tools-devel-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","perf-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","perf-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","python2-perf-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","python2-perf-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","python3-perf-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm","python3-perf-debuginfo-4.19.90-2509.4.0.0343.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38498"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39689"}],"database_specific":{"severity":"High"}}
