openEuler 22.03 LTS SP3 update for kernel



Published: 2024-07-02
Risk Medium
Patch available YES
Number of vulnerabilities 17
CVE-ID CVE-2021-47469
CVE-2023-39180
CVE-2023-52853
CVE-2024-26592
CVE-2024-26925
CVE-2024-27053
CVE-2024-35830
CVE-2024-35902
CVE-2024-35955
CVE-2024-36950
CVE-2024-36969
CVE-2024-36978
CVE-2024-38545
CVE-2024-38588
CVE-2024-38591
CVE-2024-38596
CVE-2024-38601
CWE-ID CWE-667
CWE-401
CWE-476
CWE-416
CWE-399
CWE-388
CWE-369
CWE-125
CWE-366
CWE-835
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
openEuler
Operating systems & Components / Operating system

kernel-debuginfo
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 17 vulnerabilities.

1) Improper locking

EUVDB-ID: #VU90737

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47469

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the LIST_HEAD(), spi_add_device(), spi_add_device_locked(), spi_register_controller() and spi_unregister_controller() functions in drivers/spi/spi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU92188

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-39180

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak when handling SMB2_READ commands in ksmbd. A remote attacker can force the application to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU91229

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52853

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cp2112_gpio_irq_startup() and cp2112_probe() functions in drivers/hid/hid-cp2112.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU86812

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26592

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a race condition when handling TCP connect and disconnect events within the ksmbd_tcp_new_connection() function in ksmbd. A remote non-authenticated attacker can trigger a use-after-free error and crash the kernel or execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU92034

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26925

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __nf_tables_abort() and nf_tables_abort() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper locking

EUVDB-ID: #VU92029

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27053

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the wilc_parse_join_bss_param() function in drivers/staging/wilc1000/wilc_hif.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU93591

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35830

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU91234

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35902

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU90145

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35955

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the check_kprobe_address_safe() function in kernel/kprobes.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper error handling

EUVDB-ID: #VU92055

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36950

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Division by zero

EUVDB-ID: #VU91563

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36969

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the setup_dsc_config() function in drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Out-of-bounds read

EUVDB-ID: #VU92332

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36978

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the multiq_tune() function in net/sched/sch_multiq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU92306

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38545

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the alloc_cqc(), free_cqc() and hns_roce_cq_event() functions in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU92312

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38588

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lookup_rec(), ftrace_location_range(), ftrace_process_locs(), ftrace_release_mod() and ftrace_free_mem() functions in kernel/trace/ftrace.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU92364

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38591

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the alloc_srqc() and free_srqc() functions in drivers/infiniband/hw/hns/hns_roce_srq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Race condition within a thread

EUVDB-ID: #VU92380

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38596

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

The vulnerability exists due to a data race within the unix_stream_sendmsg() function in net/unix/af_unix.c. A local user can manipulate data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Infinite loop

EUVDB-ID: #VU93063

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38601

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the rb_check_list() and ring_buffer_resize() functions in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debuginfo: before 5.10.0-215.0.0.119

perf-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-debuginfo: before 5.10.0-215.0.0.119

kernel-tools-devel: before 5.10.0-215.0.0.119

python3-perf: before 5.10.0-215.0.0.119

kernel-debugsource: before 5.10.0-215.0.0.119

python3-perf-debuginfo: before 5.10.0-215.0.0.119

kernel-devel: before 5.10.0-215.0.0.119

kernel-source: before 5.10.0-215.0.0.119

kernel-tools: before 5.10.0-215.0.0.119

kernel-headers: before 5.10.0-215.0.0.119

perf: before 5.10.0-215.0.0.119

kernel: before 5.10.0-215.0.0.119

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###