Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-2531)

Published: 2020-01-23 13:03:47
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' Linux Distribution Package(s) announced via the EulerOS-SA-2019-2531 advisory.

Detection Method:
Checks if a vulnerable Linux Distribution Package version is present on the target host.

Technical Details:
The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.(CVE-2016-2186) The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.(CVE-2014-9892) A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.(CVE-2019-19054) A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.(CVE-2019-19060) A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.(CVE-2019-19061) A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.(CVE-2019-19062) A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.(CVE-2019-18808) In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.(CVE-2017-13216) A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including ... Description truncated. Please see the references for more information.

Affected Versions:
'kernel' Linux Distribution Package(s) on Huawei EulerOS V2.0SP5.

Recommendations:
Please install the updated Linux Distribution Package(s).

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2012-2372
https://nvd.nist.gov/vuln/detail/CVE-2014-4157
https://nvd.nist.gov/vuln/detail/CVE-2014-4508
https://nvd.nist.gov/vuln/detail/CVE-2014-7843
https://nvd.nist.gov/vuln/detail/CVE-2014-8133
https://nvd.nist.gov/vuln/detail/CVE-2014-9870
https://nvd.nist.gov/vuln/detail/CVE-2014-9888
https://nvd.nist.gov/vuln/detail/CVE-2014-9892
https://nvd.nist.gov/vuln/detail/CVE-2015-3332
https://nvd.nist.gov/vuln/detail/CVE-2015-4001
https://nvd.nist.gov/vuln/detail/CVE-2015-4002
https://nvd.nist.gov/vuln/detail/CVE-2015-4003
https://nvd.nist.gov/vuln/detail/CVE-2015-4004
https://nvd.nist.gov/vuln/detail/CVE-2015-7833
https://nvd.nist.gov/vuln/detail/CVE-2015-8955
https://nvd.nist.gov/vuln/detail/CVE-2015-8967
https://nvd.nist.gov/vuln/detail/CVE-2015-9289
https://nvd.nist.gov/vuln/detail/CVE-2016-2186
https://nvd.nist.gov/vuln/detail/CVE-2016-3857
https://nvd.nist.gov/vuln/detail/CVE-2016-4486
https://nvd.nist.gov/vuln/detail/CVE-2016-6130
https://nvd.nist.gov/vuln/detail/CVE-2017-13216
https://nvd.nist.gov/vuln/detail/CVE-2017-15537
https://nvd.nist.gov/vuln/detail/CVE-2017-16647
https://nvd.nist.gov/vuln/detail/CVE-2017-18551
https://nvd.nist.gov/vuln/detail/CVE-2017-5897
https://nvd.nist.gov/vuln/detail/CVE-2017-7482
https://nvd.nist.gov/vuln/detail/CVE-2017-8831
https://nvd.nist.gov/vuln/detail/CVE-2018-14625
https://nvd.nist.gov/vuln/detail/CVE-2018-20510
https://nvd.nist.gov/vuln/detail/CVE-2018-7755
https://nvd.nist.gov/vuln/detail/CVE-2018-7995
https://nvd.nist.gov/vuln/detail/CVE-2018-9363
https://nvd.nist.gov/vuln/detail/CVE-2019-0136
https://nvd.nist.gov/vuln/detail/CVE-2019-10126
https://nvd.nist.gov/vuln/detail/CVE-2019-16231
https://nvd.nist.gov/vuln/detail/CVE-2019-16232
https://nvd.nist.gov/vuln/detail/CVE-2019-16234
https://nvd.nist.gov/vuln/detail/CVE-2019-16746
https://nvd.nist.gov/vuln/detail/CVE-2019-17075
https://nvd.nist.gov/vuln/detail/CVE-2019-17133
https://nvd.nist.gov/vuln/detail/CVE-2019-17666
https://nvd.nist.gov/vuln/detail/CVE-2019-18806
https://nvd.nist.gov/vuln/detail/CVE-2019-18808
https://nvd.nist.gov/vuln/detail/CVE-2019-19054
https://nvd.nist.gov/vuln/detail/CVE-2019-19060
https://nvd.nist.gov/vuln/detail/CVE-2019-19061
https://nvd.nist.gov/vuln/detail/CVE-2019-19062
https://nvd.nist.gov/vuln/detail/CVE-2019-19066
https://nvd.nist.gov/vuln/detail/CVE-2019-3846
https://nvd.nist.gov/vuln/detail/CVE-2019-9506

References:

https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2531

Search
Severity
High
CVSS Score
9.3

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.