openEuler 20.03 LTS update for kernel



| Updated: 2025-04-24
Risk Medium
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2020-26088
CVE-2020-25284
CVE-2020-0432
CVE-2020-14314
CVE-2020-25285
CVE-2020-14390
CVE-2020-25212
CVE-2020-14385
CVE-2020-25641
CWE-ID CWE-276
CWE-863
CWE-190
CWE-125
CWE-476
CWE-367
CWE-119
CWE-835
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Incorrect default permissions

EUVDB-ID: #VU92767

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-26088

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Incorrect authorization

EUVDB-ID: #VU92423

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25284

CWE-ID: CWE-863 - Incorrect Authorization

Exploit availability: No

Description

The vulnerability allows a local privileged user to manipulate data.

The vulnerability exists due to incorrect authorization error within the rbd_config_info_show(), rbd_image_refresh(), do_rbd_add() and do_rbd_remove() functions in drivers/block/rbd.c. A local privileged user can manipulate data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Integer overflow

EUVDB-ID: #VU47041

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-0432

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local authenticated user to execute arbitrary code.

In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU47106

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-14314

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU90669

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25285

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local privileged user to execute arbitrary code.

The vulnerability exists due to NULL pointer dereference within the allowed_mems_nr(), hugetlb_sysctl_handler_common() and hugetlb_overcommit_handler() functions in mm/hugetlb.c. A local privileged user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU47220

Risk: Medium

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-14390

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to an out-of-bounds read that occurs leading to memory corruption or a denial of service. This highest threat from this vulnerability is to system availability.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU51433

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25212

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a TOCTOU mismatch in the NFS client code in the Linux kernel. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer overflow

EUVDB-ID: #VU58841

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-14385

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the file system metadata validator in XFS. A local user can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt and shutdown the the filesystem.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Infinite loop

EUVDB-ID: #VU48941

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25641

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect implementation of biovecs in Linux kernel. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. A local user can issue requests to a block device and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS

bpftool-debuginfo: before 4.19.90-2010.2.0.0046

bpftool: before 4.19.90-2010.2.0.0046

python3-perf-debuginfo: before 4.19.90-2010.2.0.0046

python3-perf: before 4.19.90-2010.2.0.0046

python2-perf-debuginfo: before 4.19.90-2010.2.0.0046

python2-perf: before 4.19.90-2010.2.0.0046

perf-debuginfo: before 4.19.90-2010.2.0.0046

perf: before 4.19.90-2010.2.0.0046

kernel-tools-devel: before 4.19.90-2010.2.0.0046

kernel-tools-debuginfo: before 4.19.90-2010.2.0.0046

kernel-tools: before 4.19.90-2010.2.0.0046

kernel-source: before 4.19.90-2010.2.0.0046

kernel-devel: before 4.19.90-2010.2.0.0046

kernel-debugsource: before 4.19.90-2010.2.0.0046

kernel-debuginfo: before 4.19.90-2010.2.0.0046

kernel: before 4.19.90-2010.2.0.0046

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1075


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###