<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2022-0002</id>
    <title>An update for kernel is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2022-10-18 09:08:01"/>
    <updated date="2022-10-18 09:08:01"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123" id="CVE-2022-21123" title="CVE-2022-21123 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386" id="CVE-2020-36386" title="CVE-2020-36386 Base Score: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786" id="CVE-2020-27786" title="CVE-2020-27786 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609" id="CVE-2021-3609" title="CVE-2021-3609 Base Score: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166" id="CVE-2022-21166" title="CVE-2022-21166 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485" id="CVE-2021-45485" title="CVE-2021-45485 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133" id="CVE-2021-23133" title="CVE-2021-23133 Base Score: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160" id="CVE-2021-38160" title="CVE-2021-38160 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125" id="CVE-2022-21125" title="CVE-2022-21125 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011" id="CVE-2022-1011" title="CVE-2022-1011 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388" id="CVE-2022-28388" title="CVE-2022-28388 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966" id="CVE-2022-1966" title="CVE-2022-1966 Base Score: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390" id="CVE-2022-28390" title="CVE-2022-28390 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588" id="CVE-2022-2588" title="CVE-2022-2588 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. (CVE-2022-21123)

An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. (CVE-2020-36386)

A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-27786)

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root. (CVE-2021-3609)

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. (CVE-2022-21166)

In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses. (CVE-2021-45485)

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-&gt;sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. (CVE-2021-23133)

** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior. (CVE-2021-38160)

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. (CVE-2022-21125)

A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (CVE-2022-1011)

usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28388)

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. (CVE-2022-1966)

ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28390)

A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem. (CVE-2022-2588)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="kernel">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="bpftool" version="3.10.0" release="1160.76.2.hce1c">
          <filename>bpftool-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="kernel-abi-whitelists" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-abi-whitelists-3.10.0-1160.76.2.hce1c.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-debug-devel" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-debug-devel-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-devel" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-devel-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-headers" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-headers-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-tools" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-tools-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-tools-libs" version="3.10.0" release="1160.76.2.hce1c">
          <filename>kernel-tools-libs-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="perf" version="3.10.0" release="1160.76.2.hce1c">
          <filename>perf-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="python-perf" version="3.10.0" release="1160.76.2.hce1c">
          <filename>python-perf-3.10.0-1160.76.2.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
