An update for kernel is now available for openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1039
Final
1.0
1.0
2023-01-18
Initial
2023-01-18
2023-01-18
openEuler SA Tool V1.0
2023-01-18
kernel security update
An update for kernel is now available for openEuler-22.03-LTS-SP1.
The Linux Kernel, the operating system core itself.
Security Fix(es):
A use-after-free flaw was found in the Linux kernel?s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-3424)
A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.(CVE-2022-4662)
An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.(CVE-2022-47946)
A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.(CVE-2022-4842)
An update for kernel is now available for openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
kernel
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1039
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-3424
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-4662
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-47946
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-4842
https://nvd.nist.gov/vuln/detail/CVE-2022-3424
https://nvd.nist.gov/vuln/detail/CVE-2022-4662
https://nvd.nist.gov/vuln/detail/CVE-2022-47946
https://nvd.nist.gov/vuln/detail/CVE-2022-4842
openEuler-22.03-LTS-SP1
kernel-headers-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
python3-perf-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
perf-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
python3-perf-debuginfo-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-source-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
bpftool-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-debugsource-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
perf-debuginfo-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
bpftool-debuginfo-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-tools-devel-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-devel-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-tools-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-debuginfo-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-tools-debuginfo-5.10.0-136.15.0.91.oe2203sp1.aarch64.rpm
kernel-5.10.0-136.15.0.91.oe2203sp1.src.rpm
kernel-source-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-devel-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-tools-debuginfo-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
python3-perf-debuginfo-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-tools-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-debuginfo-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-headers-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
python3-perf-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-debugsource-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
bpftool-debuginfo-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
perf-debuginfo-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
bpftool-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
perf-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
kernel-tools-devel-5.10.0-136.15.0.91.oe2203sp1.x86_64.rpm
A use-after-free flaw was found in the Linux kernel?s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
2023-01-18
CVE-2022-3424
openEuler-22.03-LTS-SP1
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2023-01-18
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1039
A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.
2023-01-18
CVE-2022-4662
openEuler-22.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
kernel security update
2023-01-18
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1039
An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.
2023-01-18
CVE-2022-47946
openEuler-22.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
kernel security update
2023-01-18
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1039
A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.
2023-01-20
CVE-2022-4842
openEuler-22.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
kernel security update
2023-01-20
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1039