SB2025032916 - openEuler 22.03 LTS SP3 update for kernel



SB2025032916 - openEuler 22.03 LTS SP3 update for kernel

Published: March 29, 2025

Security Bulletin ID SB2025032916
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Memory leak (CVE-ID: CVE-2022-49135)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dp_link_settings_read(), dp_phy_settings_read(), dp_dsc_clock_en_read(), dp_dsc_slice_width_read(), dp_dsc_slice_height_read(), dp_dsc_bits_per_pixel_read(), dp_dsc_pic_width_read(), dp_dsc_pic_height_read(), dp_dsc_chunk_size_read(), dp_dsc_slice_bpg_offset_read() and dcc_en_bits_read() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c. A local user can perform a denial of service (DoS) attack.


2) Buffer overflow (CVE-ID: CVE-2022-49266)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the blkcg_iolatency_done_bio() function in block/blk-iolatency.c. A local user can perform a denial of service (DoS) attack.


3) Out-of-bounds read (CVE-ID: CVE-2022-49444)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the elf_validity_check() function in kernel/module.c. A local user can perform a denial of service (DoS) attack.


4) Use-after-free (CVE-ID: CVE-2022-49711)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fsl_mc_bus_remove() function in drivers/bus/fsl-mc/fsl-mc-bus.c. A local user can escalate privileges on the system.


Remediation

Install update from vendor's website.