openEuler update for kernel



Risk Medium
Patch available YES
Number of vulnerabilities 11
CVE-ID CVE-2020-36385
CVE-2020-28097
CVE-2021-33624
CVE-2021-35039
CVE-2021-22555
CVE-2021-3573
CVE-2021-0129
CVE-2021-34693
CVE-2020-36387
CVE-2021-3609
CVE-2021-3600
CWE-ID CWE-416
CWE-125
CWE-843
CWE-347
CWE-787
CWE-284
CWE-908
CWE-362
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #3 is available.
Vulnerability #5 is being exploited in the wild.
Public exploit code for vulnerability #10 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 11 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU58332

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-36385

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in drivers/infiniband/core/ucma.c, because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. A local user can run a specially crafted program to trigger the use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU70766

Risk: Low

CVSSv4.0: 1.8 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-28097

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows an attacker with physical access to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the Linux kernel’s implementation of the invert video code on VGA consoles. A local user with access to the VGA console can scroll the console, calling an ioctl TIOCL_SCROLLCONSOLE to crash the system, potentially reading random out-of-bound memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Type Confusion

EUVDB-ID: #VU64881

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2021-33624

CWE-ID: CWE-843 - Type confusion

Exploit availability: Yes

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a type confusion error within kernel/bpf/verifier.c in the Linux kernel. A an unprivileged BPF program can read arbitrary memory locations via a side-channel attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

4) Improper Verification of Cryptographic Signature

EUVDB-ID: #VU66477

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-35039

CWE-ID: CWE-347 - Improper Verification of Cryptographic Signature

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper signature handling in the kernel/module.c in Linux kernel. If the kernel module is not signed, it still can be loaded into the system via init_module if module.sig_enforce=1 command-line argument is used. As a result, a local user can load unsigned and potentially malicious kernel modules.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds write

EUVDB-ID: #VU56017

Risk: Low

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]

CVE-ID: CVE-2021-22555

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when processing untrusted input in net/netfilter/x_tables.c in Linux kernel. A local user can run a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

6) Use-after-free

EUVDB-ID: #VU63662

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-3573

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows local user to escalate their privileges on the system.

The vulnerability exists due to a use-after-free in hci_sock_bound_ioctl() function of the Linux kernel HCI subsystem triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user can use this flaw to crash the system or escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper access control

EUVDB-ID: #VU54202

Risk: Low

CVSSv4.0: 4.5 [CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-0129

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote authenticated attacker on the local network can bypass implemented security restrictions and enable information disclosure

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use of uninitialized resource

EUVDB-ID: #VU55263

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-34693

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU83430

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-36387

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local authenticated user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within thefs/io_uring.c. A local authenticated user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Race condition

EUVDB-ID: #VU54292

Risk: Medium

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2021-3609

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in the CAN BCM networking protocol (net/can/bcm.c) in the Linux kernel ranging from version 2.6.25 to mainline 5.13-rc6. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

11) Out-of-bounds read

EUVDB-ID: #VU92400

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-3600

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to out-of-bounds read error within the fixup_bpf_calls() function in kernel/bpf/verifier.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

kernel-tools-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf-debuginfo: before 4.19.90-2107.4.0.0097

perf-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools: before 4.19.90-2107.4.0.0097

kernel-debuginfo: before 4.19.90-2107.4.0.0097

kernel-tools-devel: before 4.19.90-2107.4.0.0097

kernel-source: before 4.19.90-2107.4.0.0097

bpftool-debuginfo: before 4.19.90-2107.4.0.0097

python3-perf: before 4.19.90-2107.4.0.0097

bpftool: before 4.19.90-2107.4.0.0097

python3-perf-debuginfo: before 4.19.90-2107.4.0.0097

python2-perf: before 4.19.90-2107.4.0.0097

kernel-debugsource: before 4.19.90-2107.4.0.0097

perf: before 4.19.90-2107.4.0.0097

kernel-devel: before 4.19.90-2107.4.0.0097

kernel: before 4.19.90-2107.4.0.0097

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###