{"id":"OESA-2022-1895","summary":"kernel security update","details":"\r\n\r\nSecurity Fix(es):\r\n\r\nA flaw was found in the kernels implementation of proxied virtualized TPM devices.  On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.\r\n\r\nReferences:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f(CVE-2022-2977)\r\n\r\nThe linux kernels driver for the &quot;ASIX AX88179_178A based USB 2.0/3.0 Gigabit Ethernet Devices&quot; contains multiple out-of-bounds reads and possible writes in the ax88179_rx_fixup() function. \r\n\r\n\nReferences:\r\n\r\nhttps://www.spinics.net/lists/stable/msg536418.html\r\n\r\nUpstream commit:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581(CVE-2022-2964)\r\n\r\nA race condition was found in the Linux kernel&apos;s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.(CVE-2022-3028)","modified":"2025-09-03T06:18:13.763822Z","published":"2022-09-07T11:04:14Z","upstream":["CVE-2022-2964","CVE-2022-2977","CVE-2022-3028"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1895"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3028"}],"affected":[{"package":{"name":"kernel","ecosystem":"openEuler:20.03-LTS-SP3","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2209.1.0.0166.oe1"}]}],"ecosystem_specific":{"x86_64":["perf-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-tools-devel-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python2-perf-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-tools-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-devel-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python3-perf-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","perf-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python3-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-debugsource-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","bpftool-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","kernel-source-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","python2-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.x86_64.rpm","bpftool-4.19.90-2209.1.0.0166.oe1.x86_64.rpm"],"aarch64":["kernel-debugsource-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","perf-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","bpftool-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python3-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-tools-devel-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python3-perf-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-devel-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-source-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-tools-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python2-perf-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","perf-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","python2-perf-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm","bpftool-debuginfo-4.19.90-2209.1.0.0166.oe1.aarch64.rpm"],"src":["kernel-4.19.90-2209.1.0.0166.oe1.src.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2022-1895.json"}}],"schema_version":"1.7.3"}