Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU69757
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-3542
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the bnx2x_tpa_stop() function in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c. A local user can force the system to leak memory and perform denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
perf-debuginfo: before 5.10.0-60.66.0.91
kernel-tools-devel: before 5.10.0-60.66.0.91
kernel-devel: before 5.10.0-60.66.0.91
kernel-source: before 5.10.0-60.66.0.91
kernel-tools-debuginfo: before 5.10.0-60.66.0.91
kernel-headers: before 5.10.0-60.66.0.91
python3-perf-debuginfo: before 5.10.0-60.66.0.91
python3-perf: before 5.10.0-60.66.0.91
perf: before 5.10.0-60.66.0.91
kernel-tools: before 5.10.0-60.66.0.91
kernel-debuginfo: before 5.10.0-60.66.0.91
bpftool-debuginfo: before 5.10.0-60.66.0.91
bpftool: before 5.10.0-60.66.0.91
kernel-debugsource: before 5.10.0-60.66.0.91
kernel: before 5.10.0-60.66.0.91
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2071
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU73782
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-3606
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the find_prog_by_sec_insn() function in tools/lib/bpf/libbpf.c of the BPF component. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
perf-debuginfo: before 5.10.0-60.66.0.91
kernel-tools-devel: before 5.10.0-60.66.0.91
kernel-devel: before 5.10.0-60.66.0.91
kernel-source: before 5.10.0-60.66.0.91
kernel-tools-debuginfo: before 5.10.0-60.66.0.91
kernel-headers: before 5.10.0-60.66.0.91
python3-perf-debuginfo: before 5.10.0-60.66.0.91
python3-perf: before 5.10.0-60.66.0.91
perf: before 5.10.0-60.66.0.91
kernel-tools: before 5.10.0-60.66.0.91
kernel-debuginfo: before 5.10.0-60.66.0.91
bpftool-debuginfo: before 5.10.0-60.66.0.91
bpftool: before 5.10.0-60.66.0.91
kernel-debugsource: before 5.10.0-60.66.0.91
kernel: before 5.10.0-60.66.0.91
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2071
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67587
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-40768
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in the drivers/scsi/stex.c in the Linux kernel. A local user can obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
perf-debuginfo: before 5.10.0-60.66.0.91
kernel-tools-devel: before 5.10.0-60.66.0.91
kernel-devel: before 5.10.0-60.66.0.91
kernel-source: before 5.10.0-60.66.0.91
kernel-tools-debuginfo: before 5.10.0-60.66.0.91
kernel-headers: before 5.10.0-60.66.0.91
python3-perf-debuginfo: before 5.10.0-60.66.0.91
python3-perf: before 5.10.0-60.66.0.91
perf: before 5.10.0-60.66.0.91
kernel-tools: before 5.10.0-60.66.0.91
kernel-debuginfo: before 5.10.0-60.66.0.91
bpftool-debuginfo: before 5.10.0-60.66.0.91
bpftool: before 5.10.0-60.66.0.91
kernel-debugsource: before 5.10.0-60.66.0.91
kernel: before 5.10.0-60.66.0.91
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2071
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.