An update for kexec-tools is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1825
Final
1.0
1.0
2022-08-13
Initial
2022-08-13
2022-08-13
openEuler SA Tool V1.0
2022-08-13
kexec-tools security update
An update for kexec-tools is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
kexec-tools provides /sbin/kexec binary that facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. This package contains the /sbin/kexec binary and ancillary utilities that together form the userspace component of the kernel's kexec feature.
Security Fix(es):
A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.(CVE-2021-20269)
An update for kexec-tools is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
kexec-tools
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1825
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-20269
https://nvd.nist.gov/vuln/detail/CVE-2021-20269
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
kexec-tools-debuginfo-2.0.20-16.oe1.aarch64.rpm
kexec-tools-debugsource-2.0.20-16.oe1.aarch64.rpm
kexec-tools-2.0.20-16.oe1.aarch64.rpm
kexec-tools-debuginfo-2.0.20-18.oe1.aarch64.rpm
kexec-tools-debugsource-2.0.20-18.oe1.aarch64.rpm
kexec-tools-2.0.20-18.oe1.aarch64.rpm
kexec-tools-debugsource-2.0.23-5.oe2203.aarch64.rpm
kexec-tools-2.0.23-5.oe2203.aarch64.rpm
kexec-tools-debuginfo-2.0.23-5.oe2203.aarch64.rpm
kexec-tools-help-2.0.20-16.oe1.noarch.rpm
kexec-tools-help-2.0.20-18.oe1.noarch.rpm
kexec-tools-help-2.0.23-5.oe2203.noarch.rpm
kexec-tools-2.0.20-16.oe1.src.rpm
kexec-tools-2.0.20-18.oe1.src.rpm
kexec-tools-2.0.23-5.oe2203.src.rpm
kexec-tools-debugsource-2.0.20-16.oe1.x86_64.rpm
kexec-tools-debuginfo-2.0.20-16.oe1.x86_64.rpm
kexec-tools-2.0.20-16.oe1.x86_64.rpm
kexec-tools-debuginfo-2.0.20-18.oe1.x86_64.rpm
kexec-tools-debugsource-2.0.20-18.oe1.x86_64.rpm
kexec-tools-2.0.20-18.oe1.x86_64.rpm
kexec-tools-debugsource-2.0.23-5.oe2203.x86_64.rpm
kexec-tools-debuginfo-2.0.23-5.oe2203.x86_64.rpm
kexec-tools-2.0.23-5.oe2203.x86_64.rpm
A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.
2022-08-13
CVE-2021-20269
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Medium
6.2
AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
kexec-tools security update
2022-08-13
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1825