Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-28915 CVE-2022-27666 |
CWE-ID | CWE-126 CWE-122 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software |
Anolis OS Operating systems & Components / Operating system kernel-doc Operating systems & Components / Operating system package or component kernel-abi-stablelists Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-libs Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-modules-extra Operating systems & Components / Operating system package or component kernel-modules Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debug-modules-extra Operating systems & Components / Operating system package or component kernel-debug-modules Operating systems & Components / Operating system package or component kernel-debug-devel Operating systems & Components / Operating system package or component kernel-debug-core Operating systems & Components / Operating system package or component kernel-debug Operating systems & Components / Operating system package or component kernel-cross-headers Operating systems & Components / Operating system package or component kernel-core Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component |
Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU64793
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-28915
CWE-ID:
CWE-126 - Buffer over-read
Exploit availability: No
DescriptionThe vulnerability allows a local user with physical access to perform a denial of service attack.
The vulnerability exists due to an out-of-bounds (OOB) memory access flaw in fbcon_get_font() function in drivers/video/fbdev/core/fbcon.c in fbcon driver module in the Linux kernel. A local user with special user privilege and with physical access can gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-372.13.1
kernel-abi-stablelists: before 4.18.0-372.13.1
python3-perf: before 4.18.0-372.13.1
perf: before 4.18.0-372.13.1
kernel-tools-libs: before 4.18.0-372.13.1
kernel-tools: before 4.18.0-372.13.1
kernel-modules-extra: before 4.18.0-372.13.1
kernel-modules: before 4.18.0-372.13.1
kernel-headers: before 4.18.0-372.13.1
kernel-devel: before 4.18.0-372.13.1
kernel-debug-modules-extra: before 4.18.0-372.13.1
kernel-debug-modules: before 4.18.0-372.13.1
kernel-debug-devel: before 4.18.0-372.13.1
kernel-debug-core: before 4.18.0-372.13.1
kernel-debug: before 4.18.0-372.13.1
kernel-cross-headers: before 4.18.0-372.13.1
kernel-core: before 4.18.0-372.13.1
kernel: before 4.18.0-372.13.1
bpftool: before 4.18.0-372.13.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0546
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61672
Risk: Low
CVSSv4.0: 6.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2022-27666
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c in Linux kernel. A local unprivileged user can pass specially crafted data to the system, trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-372.13.1
kernel-abi-stablelists: before 4.18.0-372.13.1
python3-perf: before 4.18.0-372.13.1
perf: before 4.18.0-372.13.1
kernel-tools-libs: before 4.18.0-372.13.1
kernel-tools: before 4.18.0-372.13.1
kernel-modules-extra: before 4.18.0-372.13.1
kernel-modules: before 4.18.0-372.13.1
kernel-headers: before 4.18.0-372.13.1
kernel-devel: before 4.18.0-372.13.1
kernel-debug-modules-extra: before 4.18.0-372.13.1
kernel-debug-modules: before 4.18.0-372.13.1
kernel-debug-devel: before 4.18.0-372.13.1
kernel-debug-core: before 4.18.0-372.13.1
kernel-debug: before 4.18.0-372.13.1
kernel-cross-headers: before 4.18.0-372.13.1
kernel-core: before 4.18.0-372.13.1
kernel: before 4.18.0-372.13.1
bpftool: before 4.18.0-372.13.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0546
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.