{"schema_version":"1.7.2","id":"OESA-2022-1895","modified":"2022-09-07T11:04:14Z","published":"2022-09-07T11:04:14Z","upstream":["CVE-2022-2977","CVE-2022-2964","CVE-2022-3028"],"summary":"kernel security update","details":"\r\n\r\nSecurity Fix(es):\r\n\r\nA flaw was found in the kernels implementation of proxied virtualized TPM devices.  On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.\r\n\r\nReferences:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f(CVE-2022-2977)\r\n\r\nThe linux kernels driver for the \u0026quot;ASIX AX88179_178A based USB 2.0/3.0 Gigabit Ethernet Devices\u0026quot; contains multiple out-of-bounds reads and possible writes in the ax88179_rx_fixup() function. \r\n\r\n\nReferences:\r\n\r\nhttps://www.spinics.net/lists/stable/msg536418.html\r\n\r\nUpstream commit:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581(CVE-2022-2964)\r\n\r\nA race condition was found in the Linux kernel\u0026apos;s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.(CVE-2022-3028)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"kernel","purl":"pkg:rpm/openEuler/kernel\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2209.1.0.0166.oe1"}]}],"ecosystem_specific":{"aarch64":["kernel-debugsource-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","perf-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","bpftool-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python3-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-tools-devel-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python3-perf-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-devel-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-source-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-tools-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python2-perf-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","perf-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python2-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","bpftool-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm"],"src":["kernel-4.19.90-2209.1.0.0166.oe1.src.rpm"],"x86_64":["perf-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-tools-devel-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python2-perf-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-tools-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-devel-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python3-perf-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","perf-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python3-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-debugsource-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","bpftool-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-source-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python2-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","bpftool-4.19.90-2209.1.0.0166.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1895"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3028"}],"database_specific":{"severity":"High"}}