Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2021-3656 CVE-2021-4157 CVE-2022-0322 CVE-2021-45868 CVE-2022-3202 |
CWE-ID | CWE-264 CWE-119 CWE-704 CWE-416 CWE-476 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system perf Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component python2-perf-debuginfo Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component python3-perf-debuginfo Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component python2-perf Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU56929
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3656
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions within the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest.The vulnerability allows the L2 guest to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2209.5.0.0169
kernel-debuginfo: before 4.19.90-2209.5.0.0169
perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-source: before 4.19.90-2209.5.0.0169
bpftool: before 4.19.90-2209.5.0.0169
kernel-debugsource: before 4.19.90-2209.5.0.0169
kernel-tools: before 4.19.90-2209.5.0.0169
python2-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-devel: before 4.19.90-2209.5.0.0169
python3-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-devel: before 4.19.90-2209.5.0.0169
bpftool-debuginfo: before 4.19.90-2209.5.0.0169
python2-perf: before 4.19.90-2209.5.0.0169
python3-perf: before 4.19.90-2209.5.0.0169
kernel: before 4.19.90-2209.5.0.0169
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1940
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63323
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-4157
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Linux kernel NFS subsystem. A remote attacker can create a specially crafted data and crash the system or escalate privileges on the system
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2209.5.0.0169
kernel-debuginfo: before 4.19.90-2209.5.0.0169
perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-source: before 4.19.90-2209.5.0.0169
bpftool: before 4.19.90-2209.5.0.0169
kernel-debugsource: before 4.19.90-2209.5.0.0169
kernel-tools: before 4.19.90-2209.5.0.0169
python2-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-devel: before 4.19.90-2209.5.0.0169
python3-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-devel: before 4.19.90-2209.5.0.0169
bpftool-debuginfo: before 4.19.90-2209.5.0.0169
python2-perf: before 4.19.90-2209.5.0.0169
python3-perf: before 4.19.90-2209.5.0.0169
kernel: before 4.19.90-2209.5.0.0169
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1940
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63856
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0322
CWE-ID:
CWE-704 - Type conversion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to a type conversion error in the sctp_make_strreset_req() function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel. A local user can perform a denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2209.5.0.0169
kernel-debuginfo: before 4.19.90-2209.5.0.0169
perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-source: before 4.19.90-2209.5.0.0169
bpftool: before 4.19.90-2209.5.0.0169
kernel-debugsource: before 4.19.90-2209.5.0.0169
kernel-tools: before 4.19.90-2209.5.0.0169
python2-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-devel: before 4.19.90-2209.5.0.0169
python3-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-devel: before 4.19.90-2209.5.0.0169
bpftool-debuginfo: before 4.19.90-2209.5.0.0169
python2-perf: before 4.19.90-2209.5.0.0169
python3-perf: before 4.19.90-2209.5.0.0169
kernel: before 4.19.90-2209.5.0.0169
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1940
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63422
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-45868
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial-of-service attack.
The vulnerability exists due to fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). A local user can trigger use-after-free error and perform a denial-of-service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2209.5.0.0169
kernel-debuginfo: before 4.19.90-2209.5.0.0169
perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-source: before 4.19.90-2209.5.0.0169
bpftool: before 4.19.90-2209.5.0.0169
kernel-debugsource: before 4.19.90-2209.5.0.0169
kernel-tools: before 4.19.90-2209.5.0.0169
python2-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-devel: before 4.19.90-2209.5.0.0169
python3-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-devel: before 4.19.90-2209.5.0.0169
bpftool-debuginfo: before 4.19.90-2209.5.0.0169
python2-perf: before 4.19.90-2209.5.0.0169
python3-perf: before 4.19.90-2209.5.0.0169
kernel: before 4.19.90-2209.5.0.0169
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1940
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67810
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3202
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in diFree in fs/jfs/inode.c in Journaled File System (JFS) in the Linux kernel. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2209.5.0.0169
kernel-debuginfo: before 4.19.90-2209.5.0.0169
perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-source: before 4.19.90-2209.5.0.0169
bpftool: before 4.19.90-2209.5.0.0169
kernel-debugsource: before 4.19.90-2209.5.0.0169
kernel-tools: before 4.19.90-2209.5.0.0169
python2-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-devel: before 4.19.90-2209.5.0.0169
python3-perf-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-debuginfo: before 4.19.90-2209.5.0.0169
kernel-tools-devel: before 4.19.90-2209.5.0.0169
bpftool-debuginfo: before 4.19.90-2209.5.0.0169
python2-perf: before 4.19.90-2209.5.0.0169
python3-perf: before 4.19.90-2209.5.0.0169
kernel: before 4.19.90-2209.5.0.0169
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1940
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.