An update for kernel is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1366
Final
1.0
1.0
2021-09-30
Initial
2021-09-30
2021-09-30
openEuler SA Tool V1.0
2021-09-30
kernel security update
An update for kernel is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
The Linux Kernel, the operating system core itself.
Security Fix(es):
A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.(CVE-2021-40490)
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.(CVE-2021-3653)
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.(CVE-2021-22543)
An update for kernel is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
kernel
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-40490
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-3653
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-22543
https://nvd.nist.gov/vuln/detail/CVE-2021-40490
https://nvd.nist.gov/vuln/detail/CVE-2021-3653
https://nvd.nist.gov/vuln/detail/CVE-2021-22543
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
bpftool-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python2-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-tools-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-debugsource-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-source-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python3-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-source-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-debugsource-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-tools-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python2-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
python3-perf-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
perf-debuginfo-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
bpftool-4.19.90-2109.7.0.0112.oe1.aarch64.rpm
kernel-4.19.90-2109.7.0.0112.oe1.src.rpm
kernel-4.19.90-2109.7.0.0112.oe1.src.rpm
kernel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
bpftool-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-debugsource-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-source-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python3-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-tools-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python2-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-debugsource-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python3-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python2-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python3-perf-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
bpftool-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-source-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-tools-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
python2-perf-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-tools-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
bpftool-debuginfo-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-tools-devel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
kernel-4.19.90-2109.7.0.0112.oe1.x86_64.rpm
A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
2021-09-30
CVE-2021-40490
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2021-09-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
2021-09-30
CVE-2021-3653
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
Medium
6.7
AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
kernel security update
2021-09-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
2021-09-30
CVE-2021-22543
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2021-09-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1366