SB2023021763 - openEuler 20.03 LTS SP3 update for kernel 



SB2023021763 - openEuler 20.03 LTS SP3 update for kernel

Published: February 17, 2023

Security Bulletin ID SB2023021763
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Double Free (CVE-ID: CVE-2022-3707)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the intel_gvt_dma_map_guest_page() function in Intel GVT-g graphics driver. A local user can trigger a double free error and crash the kernel.


2) Divide by zero (CVE-ID: CVE-2023-0615)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

A memory leak flaw and potential divide by 0 and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.


Remediation

Install update from vendor's website.