An update for kernel is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1366 Final 1.0 1.0 2021-09-30 Initial 2021-09-30 2021-09-30 openEuler SA Tool V1.0 2021-09-30 kernel security update An update for kernel is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. The Linux Kernel, the operating system core itself. Security Fix(es): A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.(CVE-2021-40490) A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.(CVE-2021-3653) An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.(CVE-2021-22543) An update for kernel is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High kernel https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-40490 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-3653 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-22543 https://nvd.nist.gov/vuln/detail/CVE-2021-40490 https://nvd.nist.gov/vuln/detail/CVE-2021-3653 https://nvd.nist.gov/vuln/detail/CVE-2021-22543 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm bpftool-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python2-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-tools-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-debugsource-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-source-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python3-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-source-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-debugsource-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-tools-4.19.90-2109.7.0.0112.oe1.aarch64.rpm perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python2-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm python3-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm bpftool-4.19.90-2109.7.0.0112.oe1.aarch64.rpm kernel-4.19.90-2109.7.0.0112.oe1.src.rpm kernel-4.19.90-2109.7.0.0112.oe1.src.rpm kernel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm bpftool-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-debugsource-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-source-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python3-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-tools-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python2-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-debugsource-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python2-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python3-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm bpftool-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-source-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-tools-4.19.90-2109.7.0.0112.oe1.x86_64.rpm bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm kernel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13. 2021-09-30 CVE-2021-40490 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 High 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H kernel security update 2021-09-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. 2021-09-30 CVE-2021-3653 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 Medium 6.7 AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H kernel security update 2021-09-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366 An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. 2021-09-30 CVE-2021-22543 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 High 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H kernel security update 2021-09-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366