openEuler 20.03 LTS SP4 update for kernel



Published: 2024-06-24
Risk Medium
Patch available YES
Number of vulnerabilities 12
CVE-ID CVE-2021-47182
CVE-2021-47201
CVE-2021-47203
CVE-2021-47211
CVE-2021-47216
CVE-2021-47217
CVE-2023-52477
CVE-2023-52609
CVE-2024-26635
CVE-2024-26636
CVE-2024-26640
CVE-2024-26641
CWE-ID CWE-119
CWE-399
CWE-476
CWE-401
CWE-908
CWE-362
CWE-20
CWE-824
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
openEuler
Operating systems & Components / Operating system

python2-perf
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 12 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU89395

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47182

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the scsi_mode_sense() function in drivers/scsi/scsi_lib.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU92971

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47201

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the iavf_disable_vf() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU93156

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47203

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the lpfc_drain_txq() function in drivers/scsi/lpfc/lpfc_sli.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU89394

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47211

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the snd_usb_set_sample_rate_v2v3() function in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU91648

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47216

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the asc_prt_adv_board_info() function in drivers/scsi/advansys.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer dereference

EUVDB-ID: #VU90584

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47217

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the set_hv_tscchange_cb() function in arch/x86/hyperv/hv_init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use of uninitialized resource

EUVDB-ID: #VU89393

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52477

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to usage of uninitialized BOS descriptors in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Race condition

EUVDB-ID: #VU91484

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52609

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the binder_update_page_range() function in drivers/android/binder_alloc.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use of uninitialized resource

EUVDB-ID: #VU90880

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26635

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the cpu_to_be16() function in net/llc/llc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Input validation error

EUVDB-ID: #VU90859

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26636

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the llc_ui_sendmsg() function in net/llc/af_llc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Resource management error

EUVDB-ID: #VU89397

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26640

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the skb_advance_to_frag() function in net/ipv4/tcp.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Access of Uninitialized Pointer

EUVDB-ID: #VU89396

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26641

CWE-ID: CWE-824 - Access of Uninitialized Pointer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python2-perf: before 4.19.90-2405.1.0.0275

kernel-debugsource: before 4.19.90-2405.1.0.0275

kernel-tools-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools-devel: before 4.19.90-2405.1.0.0275

perf: before 4.19.90-2405.1.0.0275

python3-perf-debuginfo: before 4.19.90-2405.1.0.0275

bpftool: before 4.19.90-2405.1.0.0275

python3-perf: before 4.19.90-2405.1.0.0275

bpftool-debuginfo: before 4.19.90-2405.1.0.0275

kernel-devel: before 4.19.90-2405.1.0.0275

perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel-source: before 4.19.90-2405.1.0.0275

kernel-debuginfo: before 4.19.90-2405.1.0.0275

kernel-tools: before 4.19.90-2405.1.0.0275

python2-perf-debuginfo: before 4.19.90-2405.1.0.0275

kernel: before 4.19.90-2405.1.0.0275

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1568


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###