Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2021-2392)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2021-2392 advisory.
Insight
Insight
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.(CVE-2020-0466) fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack, see also the exports(5) no_subtree_check default behavior.(CVE-2021-3178) An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.(CVE-2021-27363) An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.(CVE-2021-27364) A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.(CVE-2021-20261) In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used.(CVE-2017-18216) The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.(CVE-2017-8925) A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.(CVE-2021-20265) A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as ... [Please see the references for more information on the vulnerabilities]
Affected Software
Affected Software
'kernel' package(s) on Huawei EulerOS V2.0SP2.
Detection Method
Detection Method
Checks if a vulnerable package version is present on the target host.
Solution
Solution
Please install the updated package(s).
Common Vulnerabilities and Exposures (CVE)
- CVE-2017-17741
- CVE-2017-18216
- CVE-2017-5549
- CVE-2017-5897
- CVE-2017-7346
- CVE-2017-7482
- CVE-2017-8069
- CVE-2017-8925
- CVE-2017-9725
- CVE-2018-13095
- CVE-2018-13406
- CVE-2018-14609
- CVE-2019-6974
- CVE-2020-0404
- CVE-2020-0427
- CVE-2020-0431
- CVE-2020-0433
- CVE-2020-0465
- CVE-2020-0466
- CVE-2020-25669
- CVE-2020-25670
- CVE-2020-25671
- CVE-2020-25672
- CVE-2020-25673
- CVE-2020-27815
- CVE-2020-35519
- CVE-2020-36322
- CVE-2021-20261
- CVE-2021-20265
- CVE-2021-20292
- CVE-2021-23134
- CVE-2021-27363
- CVE-2021-27364
- CVE-2021-27365
- CVE-2021-28964
- CVE-2021-28972
- CVE-2021-29154
- CVE-2021-29265
- CVE-2021-30002
- CVE-2021-3178
- CVE-2021-31916
- CVE-2021-32078
- CVE-2021-32399
- CVE-2021-33033
- CVE-2021-3347
- CVE-2021-3483
- CVE-2021-3564
- CVE-2021-3573
- CVE-2021-3609