SB2022073010 - openEuler update for kernel



SB2022073010 - openEuler update for kernel

Published: July 30, 2022

Security Bulletin ID SB2022073010
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2022-2380)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in the Linux kernel framebuffer within the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. A local user can trigger ab out-of-bounds read error and crash the system.


2) Out-of-bounds read (CVE-ID: CVE-2022-20227)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in USB implementation in OS kernel. A malicious application can read potentially sensitive information from kernel memory.


3) Security features bypass (CVE-ID: CVE-2022-21505)

The vulnerability allows an attacker to bypass implemented security restrictions.

The vulnerability exists due to incorrect implementation of the IMA lockdown feature. If IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine with Secure Boot. An attacker with physical access to device can bypass Secure Boot mechanism.


Remediation

Install update from vendor's website.