OESA-2026-1340

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1340
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1340.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1340
Upstream
Published
2026-02-13T13:14:46Z
Modified
2026-02-13T16:45:28.877776Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

media: av7110: prevent underflow in writetsto_decoder()

The buf[4] value comes from the user via tsplay(). It is a value in the u8 range. The final length we pass to av7110ipackinstantrepack() is "len - (buf[4] + 1) - 4" so add a check to ensure that the length is not negative. It's not clear that passing a negative len value does anything bad necessarily, but it's not best practice.

With the new bounds checking the "if (!len)" condition is no longer possible or required so remove that.(CVE-2023-54284)

In the Linux kernel, the following vulnerability has been resolved:

ipvs: Defer ipvsftp unregister during netns cleanup

On the netns cleanup path, _ipvsftpexit() may unregister ipvsftp before connections with valid cp->app pointers are flushed, leading to a use-after-free.

Fix this by introducing a global exiting_module flag, set to true in ipvsftpexit() before unregistering the pernet subsystem. In _ipvsftpexit(), skip ipvsftp unregister if called during netns cleanup (when exitingmodule is false) and defer it to _ipvscleanupbatch(), which unregisters all apps after all connections are flushed. If called during module exit, unregister ipvsftp immediately.(CVE-2025-40018)

In the Linux kernel, the following vulnerability has been resolved:

libceph: fix potential use-after-free in havemonandosdmap()

The wait loop in _cephopensession() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both cephmonchandlemap() and handleonemap() install a new map immediately after freeing the old one

kfree(monc->monmap);
monc->monmap = monmap;

ceph_osdmap_destroy(osdc->osdmap);
osdc->osdmap = newmap;

under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in havemonandosdmap() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in

client->monc.monmap && client->monc.monmap->epoch &&
    client->osdc.osdmap && client->osdc.osdmap->epoch;

condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled:

BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70
Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305
CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266
...
Call Trace:
<TASK>
have_mon_and_osd_map+0x56/0x70
ceph_open_session+0x182/0x290
ceph_get_tree+0x333/0x680
vfs_get_tree+0x49/0x180
do_new_mount+0x1a3/0x2d0
path_mount+0x6dd/0x730
do_mount+0x99/0xe0
__do_sys_mount+0x141/0x180
do_syscall_64+0x9f/0x100
entry_SYSCALL_64_after_hwframe+0x76/0x7e
</TASK>

Allocated by task 13305:
ceph_osdmap_alloc+0x16/0x130
ceph_osdc_init+0x27a/0x4c0
ceph_create_client+0x153/0x190
create_fs_client+0x50/0x2a0
ceph_get_tree+0xff/0x680
vfs_get_tree+0x49/0x180
do_new_mount+0x1a3/0x2d0
path_mount+0x6dd/0x730
do_mount+0x99/0xe0
__do_sys_mount+0x141/0x180
do_syscall_64+0x9f/0x100
entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 9475:
kfree+0x212/0x290
handle_one_map+0x23c/0x3b0
ceph_osdc_handle_map+0x3c9/0x590
mon_dispatch+0x655/0x6f0
ceph_con_process_message+0xc3/0xe0
ceph_con_v1_try_read+0x614/0x760
ceph_con_workfn+0x2de/0x650
process_one_work+0x486/0x7c0
process_scheduled_works+0x73/0x90
worker_thread+0x1c8/0x2a0
kthread+0x2ec/0x300
ret_from_fork+0x24/0x40
ret_from_fork_asm+0x1a/0x30

Rewrite the wait loop to check the above condition directly with client->monc.mutex and client->osdc.lock taken as appropriate. While at it, improve the timeout handling (previously mounttimeout could be exceeded in case waiteventinterruptibletimeout() slept more than once) and access client->autherr under client->monc.mutex to match how it's set in finishauth().

monmapshow() and osdmapshow() now take the respective lock before accessing the map as well.(CVE-2025-68285)

In the Linux kernel, the following vulnerability has been resolved:

ip6tunnel: use skbvlaninetprepare() in _ip6tnl_rcv()

Blamed commit did not take care of VLAN encapsulations as spotted by syzbot [1].

Use skbvlaninetprepare() instead of pskbinetmaypull().

[1] BUG: KMSAN: uninit-value in _INETECNdecapsulate include/net/inetecn.h:253 [inline] BUG: KMSAN: uninit-value in INETECNdecapsulate include/net/inetecn.h:275 [inline] BUG: KMSAN: uninit-value in IP6ECNdecapsulate+0x7a8/0x1fa0 include/net/inetecn.h:321 _INETECNdecapsulate include/net/inetecn.h:253 [inline] INETECNdecapsulate include/net/inetecn.h:275 [inline] IP6ECNdecapsulate+0x7a8/0x1fa0 include/net/inetecn.h:321 ip6ip6dscpecndecapsulate+0x16f/0x1b0 net/ipv6/ip6tunnel.c:729 _ip6tnlrcv+0xed9/0x1b50 net/ipv6/ip6tunnel.c:860 ip6tnlrcv+0xc3/0x100 net/ipv6/ip6tunnel.c:903 grercv+0x1529/0x1b90 net/ipv6/ip6gre.c:-1 ip6protocoldeliverrcu+0x1c89/0x2c60 net/ipv6/ip6input.c:438 ip6inputfinish+0x1f4/0x4a0 net/ipv6/ip6input.c:489 NFHOOK include/linux/netfilter.h:318 [inline] ip6input+0x9c/0x330 net/ipv6/ip6input.c:500 ip6mcinput+0x7ca/0xc10 net/ipv6/ip6input.c:590 dstinput include/net/dst.h:474 [inline] ip6rcvfinish+0x958/0x990 net/ipv6/ip6input.c:79 NFHOOK include/linux/netfilter.h:318 [inline] ipv6rcv+0xf1/0x3c0 net/ipv6/ip6input.c:311 _netifreceiveskbonecore net/core/dev.c:6139 [inline] _netifreceiveskb+0x1df/0xac0 net/core/dev.c:6252 netifreceiveskbinternal net/core/dev.c:6338 [inline] netifreceiveskb+0x57/0x630 net/core/dev.c:6397 tunrxbatched+0x1df/0x980 drivers/net/tun.c:1485 tungetuser+0x5c0e/0x6c60 drivers/net/tun.c:1953 tunchrwriteiter+0x3e9/0x5c0 drivers/net/tun.c:1999 newsyncwrite fs/readwrite.c:593 [inline] vfswrite+0xbe2/0x15d0 fs/readwrite.c:686 ksyswrite fs/readwrite.c:738 [inline] _dosyswrite fs/readwrite.c:749 [inline] _sesyswrite fs/readwrite.c:746 [inline] _x64syswrite+0x1fb/0x4d0 fs/readwrite.c:746 x64syscall+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls64.h:2 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xd3/0xf80 arch/x86/entry/syscall64.c:94 entrySYSCALL64after_hwframe+0x77/0x7f

Uninit was created at: slabpostallochook mm/slub.c:4960 [inline] slaballocnode mm/slub.c:5263 [inline] kmemcacheallocnodenoprof+0x9e7/0x17a0 mm/slub.c:5315 kmallocreserve+0x13c/0x4b0 net/core/skbuff.c:586 _allocskb+0x805/0x1040 net/core/skbuff.c:690 allocskb include/linux/skbuff.h:1383 [inline] allocskbwithfrags+0xc5/0xa60 net/core/skbuff.c:6712 sockallocsendpskb+0xacc/0xc60 net/core/sock.c:2995 tunallocskb drivers/net/tun.c:1461 [inline] tungetuser+0x1142/0x6c60 drivers/net/tun.c:1794 tunchrwriteiter+0x3e9/0x5c0 drivers/net/tun.c:1999 newsyncwrite fs/readwrite.c:593 [inline] vfswrite+0xbe2/0x15d0 fs/readwrite.c:686 ksyswrite fs/readwrite.c:738 [inline] _dosyswrite fs/readwrite.c:749 [inline] _sesyswrite fs/readwrite.c:746 [inline] _x64syswrite+0x1fb/0x4d0 fs/readwrite.c:746 x64syscall+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls64.h:2 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xd3/0xf80 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025(CVE-2026-23003)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.90-2602.2.0.0362.oe2003sp4

Ecosystem specific

{
    "aarch64": [
        "bpftool-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "bpftool-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-debugsource-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-devel-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-source-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-tools-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-tools-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "kernel-tools-devel-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "perf-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "python2-perf-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "python2-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "python3-perf-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
        "python3-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm"
    ],
    "x86_64": [
        "bpftool-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "bpftool-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-debugsource-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-devel-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-source-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-tools-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-tools-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "kernel-tools-devel-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "perf-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "python2-perf-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "python2-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "python3-perf-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
        "python3-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm"
    ],
    "src": [
        "kernel-4.19.90-2602.2.0.0362.oe2003sp4.src.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1340.json"