Risk | High |
Patch available | YES |
Number of vulnerabilities | 21 |
CVE-ID | CVE-2019-19057 CVE-2019-19073 CVE-2019-19074 CVE-2019-20636 CVE-2020-11608 CVE-2020-11609 CVE-2020-11668 CVE-2020-12465 CVE-2021-4157 CVE-2021-4202 CVE-2021-4203 CVE-2021-45868 CVE-2022-0330 CVE-2022-0435 CVE-2022-0617 CVE-2022-0847 CVE-2022-27666 CVE-2022-1353 CVE-2022-1419 CVE-2022-22942 CVE-2022-29581 |
CWE-ID | CWE-401 CWE-787 CWE-476 CWE-120 CWE-119 CWE-416 CWE-121 CWE-908 CWE-122 CWE-200 CWE-264 CWE-911 |
Exploitation vector | Network |
Public exploit |
Vulnerability #16 is being exploited in the wild. Public exploit code for vulnerability #17 is available. Vulnerability #20 is being exploited in the wild. |
Vulnerable software |
Anolis OS Operating systems & Components / Operating system python3-perf Operating systems & Components / Operating system package or component kernel-modules-internal Operating systems & Components / Operating system package or component kernel-modules-extra Operating systems & Components / Operating system package or component kernel-modules Operating systems & Components / Operating system package or component kernel-debug-modules-extra Operating systems & Components / Operating system package or component kernel-debug-modules Operating systems & Components / Operating system package or component kernel-debug-core Operating systems & Components / Operating system package or component kernel-core Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-libs-devel Operating systems & Components / Operating system package or component kernel-tools-libs Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debug-devel Operating systems & Components / Operating system package or component kernel-debug Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component |
Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 21 vulnerabilities.
EUVDB-ID: #VU23023
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-19057
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the "mwifiex_pcie_init_evt_ring()" function in "drivers/net/wireless/marvell/mwifiex/pcie.c" file. A remote attacker on the local network can cause a denial of service condition (memory consumption) by triggering "mwifiex_map_pci_memory()" failures.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23033
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-19073
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the "htc_config_pipe_credits()", "htc_setup_complete()" and "htc_connect_service()" functions in "drivers/net/wireless/ath/ath9k/htc_hst.c" file. A remote attacker on the local network can cause a denial of service condition (memory consumption) by triggering "wait_for_completion_timeout()" failures. MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23029
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-19074
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the "ath9k_wmi_cmd()" function in "drivers/net/wireless/ath/ath9k/wmi.c" file. A remote attacker on the local network can cause a denial of service condition (memory consumption).
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU30312
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-20636
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local privileged user to execute arbitrary code.
In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28220
Risk: Low
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-11608
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in "drivers/media/usb/gspca/ov519.c" file in "ov511_mode_init_regs and ov518_mode_init_regs". A remote authenticated attacker can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28221
Risk: Low
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-11609
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the stv06xx subsystem in the "drivers/media/usb/gspca/stv06xx/stv06xx.c" and "drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c" files. A remote authenticated attacker can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27875
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-11668
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the drivers/media/usb/gspca/xirlink_cit.c in Xirlink camera USB driver. A local user can pass specially crafted data to the driver and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU34414
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-12465
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local privileged user to execute arbitrary code.
An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63323
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-4157
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Linux kernel NFS subsystem. A remote attacker can create a specially crafted data and crash the system or escalate privileges on the system
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63764
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4202
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the nci_request() function in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. A local user can cause a data race problem while the device is getting removed and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63838
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4203
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in sock_getsockopt() function in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() function (and connect() function) in the Linux kernel. A local user can exploit the use-after-free error and crash the system or escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63422
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-45868
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial-of-service attack.
The vulnerability exists due to fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). A local user can trigger use-after-free error and perform a denial-of-service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60988
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0330
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a random memory access flaw caused by a missing TLB flush in Linux kernel GPU i915 kernel driver functionality. A local user can execute arbitrary code on the system with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61216
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-0435
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Linux kernel networking module for the Transparent Inter-Process Communication (TIPC) protocol. A remote unauthenticated attacker can send specially crafted traffic to the system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the TIPC bearer is set up.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0617
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel UDF file system functionality. A local user can supply a malicious UDF image to the udf_file_write_iter() function and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61110
Risk: Low
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID: CVE-2022-0847
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of an uninitialized resources. A local user can overwrite arbitrary file in the page cache, even if the file is read-only, and execute arbitrary code on the system with elevated privileges.
The vulnerability was dubbed Dirty Pipe.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU61672
Risk: Low
CVSSv4.0: 6.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2022-27666
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c in Linux kernel. A local unprivileged user can pass specially crafted data to the system, trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63388
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1353
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the pfkey_register function in net/key/af_key.c in the Linux kernel. A local user can gain unauthorized access to kernel memory, leading to a system crash or a leak of internal kernel information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63418
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1419
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in vgem_gem_dumb_create() function in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61217
Risk: Low
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID: CVE-2022-22942
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an error in the vmwgfx driver in Linux kernel. A local unprivileged user can gain access to files opened by other processes on the system through a dangling 'file' pointer.
Exploiting this vulnerability requires an attacker to have access to either /dev/dri/card0 or /dev/dri/rendererD128 and be able to issue an ioctl() on the resulting file descriptor.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU63496
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-29581
CWE-ID:
CWE-911 - Improper Update of Reference Count
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper update of reference count in net/sched in Linux kernel. A local user can execute arbitrary code with root privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python3-perf: before 4.19.91-26
kernel-modules-internal: before 4.19.91-26
kernel-modules-extra: before 4.19.91-26
kernel-modules: before 4.19.91-26
kernel-debug-modules-extra: before 4.19.91-26
kernel-debug-modules: before 4.19.91-26
kernel-debug-core: before 4.19.91-26
kernel-core: before 4.19.91-26
perf: before 4.19.91-26
kernel-tools-libs-devel: before 4.19.91-26
kernel-tools-libs: before 4.19.91-26
kernel-tools: before 4.19.91-26
kernel-headers: before 4.19.91-26
kernel-devel: before 4.19.91-26
kernel-debug-devel: before 4.19.91-26
kernel-debug: before 4.19.91-26
kernel: before 4.19.91-26
bpftool: before 4.19.91-26
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0526
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.