An update for kernel is now available for openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1038 Final 1.0 1.0 2023-01-20 Initial 2023-01-20 2023-01-20 openEuler SA Tool V1.0 2023-01-20 kernel security update An update for kernel is now available for openEuler-22.03-LTS. The Linux Kernel, the operating system core itself. Security Fix(es): A use-after-free flaw was found in the Linux kernel?s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-3424) A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.(CVE-2022-4662) An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.(CVE-2022-47946) A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.(CVE-2022-4842) An update for kernel is now available for openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High kernel https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1038 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-3424 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-4662 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-47946 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-4842 https://nvd.nist.gov/vuln/detail/CVE-2022-3424 https://nvd.nist.gov/vuln/detail/CVE-2022-4662 https://nvd.nist.gov/vuln/detail/CVE-2022-47946 https://nvd.nist.gov/vuln/detail/CVE-2022-4842 openEuler-22.03-LTS kernel-tools-devel-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-tools-debuginfo-5.10.0-60.78.0.102.oe2203.aarch64.rpm perf-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-devel-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-tools-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-debugsource-5.10.0-60.78.0.102.oe2203.aarch64.rpm bpftool-5.10.0-60.78.0.102.oe2203.aarch64.rpm perf-debuginfo-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-debuginfo-5.10.0-60.78.0.102.oe2203.aarch64.rpm python3-perf-debuginfo-5.10.0-60.78.0.102.oe2203.aarch64.rpm python3-perf-5.10.0-60.78.0.102.oe2203.aarch64.rpm bpftool-debuginfo-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-source-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-headers-5.10.0-60.78.0.102.oe2203.aarch64.rpm kernel-5.10.0-60.78.0.102.oe2203.src.rpm perf-debuginfo-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-headers-5.10.0-60.78.0.102.oe2203.x86_64.rpm bpftool-debuginfo-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-devel-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-tools-devel-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-tools-5.10.0-60.78.0.102.oe2203.x86_64.rpm perf-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-tools-debuginfo-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-debugsource-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-source-5.10.0-60.78.0.102.oe2203.x86_64.rpm bpftool-5.10.0-60.78.0.102.oe2203.x86_64.rpm python3-perf-debuginfo-5.10.0-60.78.0.102.oe2203.x86_64.rpm kernel-debuginfo-5.10.0-60.78.0.102.oe2203.x86_64.rpm python3-perf-5.10.0-60.78.0.102.oe2203.x86_64.rpm A use-after-free flaw was found in the Linux kernel?s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. 2023-01-20 CVE-2022-3424 openEuler-22.03-LTS High 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H kernel security update 2023-01-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1038 A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system. 2023-01-20 CVE-2022-4662 openEuler-22.03-LTS Medium 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H kernel security update 2023-01-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1038 An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq. 2023-01-20 CVE-2022-47946 openEuler-22.03-LTS Medium 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H kernel security update 2023-01-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1038 A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system. 2023-01-20 CVE-2022-4842 openEuler-22.03-LTS Medium 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H kernel security update 2023-01-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1038