openEuler 20.03 LTS update for kernel



| Updated: 2025-04-24
Risk Medium
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2020-12351
CVE-2020-25643
CVE-2020-25645
CVE-2020-14331
CVE-2020-24490
CVE-2020-27673
CVE-2020-25669
CVE-2020-25668
CWE-ID CWE-20
CWE-125
CWE-319
CWE-787
CWE-119
CWE-416
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #5 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

perf
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU47545

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2020-12351

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input within the BlueZ implementation in Linux kernel. A remote attacker on the local network can pass specially crafted input to the application and execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Out-of-bounds read

EUVDB-ID: #VU51881

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-25643

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the HDLC_PPP module of the Linux kernel in the ppp_cp_parse_cr() function. A remote authenticated user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Cleartext transmission of sensitive information

EUVDB-ID: #VU51546

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-25645

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to traffic passed between two Geneve endpoints with configured IPsec can be unencrypted for the specific UDP port. A remote attacker with ability to intercept network traffic can gain access to sensitive data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds write

EUVDB-ID: #VU48590

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-14331

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Linux kernel’s implementation of the invert video code on VGA consoles. A local user with can run a specially crafted program to call VT_RESIZE IOCTL, trigger an out-of-bounds write and execute arbitrary code on the target system with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU47549

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2020-24490

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within BlueZ  implementation in Linux kernel. A remote attacker on the local network can pass specially crated data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

6) Input validation error

EUVDB-ID: #VU94154

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-27673

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the clear_linked(), consume_one_event(), __evtchn_fifo_handle_events() and evtchn_fifo_percpu_init() functions in drivers/xen/events/events_fifo.c, within the module_param(), DEFINE_RWLOCK(), enable_dynirq(), notify_remote_via_irq(), EXPORT_SYMBOL_GPL(), xen_irq_init(), xen_free_irq(), xen_send_IPI_one(), __xen_evtchn_do_upcall(), xen_setup_callback_vector(), xen_evtchn_cpu_prepare() and xen_init_IRQ() functions in drivers/xen/events/events_base.c, within the active_evtchns() and evtchn_2l_handle_events() functions in drivers/xen/events/events_2l.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use after free

EUVDB-ID: #VU92762

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25669

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU83431

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25668

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local authenticated user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the con_font_op. A local authenticated user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

perf: before 4.19.90-2011.6.0.0049

kernel-source: before 4.19.90-2011.6.0.0049

python2-perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools-debuginfo: before 4.19.90-2011.6.0.0049

kernel-devel: before 4.19.90-2011.6.0.0049

kernel-tools-devel: before 4.19.90-2011.6.0.0049

bpftool-debuginfo: before 4.19.90-2011.6.0.0049

python3-perf: before 4.19.90-2011.6.0.0049

python2-perf: before 4.19.90-2011.6.0.0049

python3-perf-debuginfo: before 4.19.90-2011.6.0.0049

perf-debuginfo: before 4.19.90-2011.6.0.0049

kernel-debuginfo: before 4.19.90-2011.6.0.0049

kernel-tools: before 4.19.90-2011.6.0.0049

kernel-debugsource: before 4.19.90-2011.6.0.0049

bpftool: before 4.19.90-2011.6.0.0049

kernel: before 4.19.90-2011.6.0.0049

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1104


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###