{"id":"OESA-2025-1466","summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: add check read-only before truncation in jfs_truncate_nolock()\n\nAdded a check for &quot;read-only&quot; mode in the `jfs_truncate_nolock`\nfunction to avoid errors related to writing to a read-only\nfilesystem.\n\nCall stack:\n\nblock_write_begin() {\n  jfs_write_failed() {\n    jfs_truncate() {\n      jfs_truncate_nolock() {\n        txEnd() {\n          ...\n          log = JFS_SBI(tblk-&gt;sb)-&gt;log;\n          // (log == NULL)\n\nIf the `isReadOnly(ip)` condition is triggered in\n`jfs_truncate_nolock`, the function execution will stop, and no\nfurther data modification will occur. Instead, the `xtTruncate`\nfunction will be called with the &quot;COMMIT_WMAP&quot; flag, preventing\nmodifications in &quot;read-only&quot; mode.(CVE-2024-58094)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nndisc: extend RCU protection in ndisc_send_skb()\n\nndisc_send_skb() can be called without RTNL or RCU held.\n\nAcquire rcu_read_lock() earlier, so that we can use dev_net_rcu()\nand avoid a potential UAF.(CVE-2025-21760)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: use RCU protection in ovs_vport_cmd_fill_info()\n\novs_vport_cmd_fill_info() can be called without RTNL or RCU.\n\nUse RCU protection and dev_net_rcu() to avoid potential UAF.(CVE-2025-21761)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\narp: use RCU protection in arp_xmit()\n\narp_xmit() can be called without RTNL or RCU protection.\n\nUse RCU protection to avoid potential UAF.(CVE-2025-21762)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nneighbour: use RCU protection in __neigh_notify()\n\n__neigh_notify() can be called without RTNL or RCU protection.\n\nUse RCU protection to avoid potential UAF.(CVE-2025-21763)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nndisc: use RCU protection in ndisc_alloc_skb()\n\nndisc_alloc_skb() can be called without RTNL or RCU being held.\n\nAdd RCU protection to avoid possible UAF.(CVE-2025-21764)","modified":"2025-09-03T06:31:17.914696Z","published":"2025-05-09T12:42:04Z","upstream":["CVE-2024-58094","CVE-2025-21760","CVE-2025-21761","CVE-2025-21762","CVE-2025-21763","CVE-2025-21764"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1466"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58094"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21761"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21762"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21763"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21764"}],"affected":[{"package":{"name":"kernel","ecosystem":"openEuler:22.03-LTS-SP3","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.0-262.0.0.164.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["kernel-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-debuginfo-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-debugsource-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-devel-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-headers-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-source-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-tools-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-tools-debuginfo-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","kernel-tools-devel-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","perf-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","perf-debuginfo-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","python3-perf-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm","python3-perf-debuginfo-5.10.0-262.0.0.164.oe2203sp3.aarch64.rpm"],"x86_64":["kernel-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-debuginfo-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-debugsource-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-devel-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-headers-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-source-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-tools-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-tools-debuginfo-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","kernel-tools-devel-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","perf-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","perf-debuginfo-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","python3-perf-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm","python3-perf-debuginfo-5.10.0-262.0.0.164.oe2203sp3.x86_64.rpm"],"src":["kernel-5.10.0-262.0.0.164.oe2203sp3.src.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2025-1466.json"}}],"schema_version":"1.7.3"}