openEuler 20.03 LTS SP4 update for kernel



| Updated: 2025-03-14
Risk Medium
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2022-48636
CVE-2022-48664
CVE-2023-52675
CVE-2024-26825
CVE-2024-26851
CVE-2024-26865
CVE-2024-26901
CVE-2024-26903
CVE-2024-26921
CVE-2024-26923
CVE-2024-26926
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CWE-ID CWE-399
CWE-667
CWE-476
CWE-401
CWE-125
CWE-416
CWE-200
CWE-191
CWE-823
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #14 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

kernel-source
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

1) Resource management error

EUVDB-ID: #VU92987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48636

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dasd_alias_remove_device() and dasd_alias_get_start_dev() functions in drivers/s390/block/dasd_alias.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU92031

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48664

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the close_ctree() function in fs/btrfs/disk-io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU90547

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52675

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the update_events_in_group() function in arch/powerpc/perf/imc-pmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU93765

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26825

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nci_free_device() function in net/nfc/nci/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU91096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26851

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the decode_seq() function in net/netfilter/nf_conntrack_h323_asn1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU90195

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26865

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tcp_twsk_purge() function in net/ipv4/tcp_minisocks.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Information disclosure

EUVDB-ID: #VU91363

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26901

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to information disclosure within the do_sys_name_to_handle() function in fs/fhandle.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU92070

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26903

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rfcomm_process_rx() function in net/bluetooth/rfcomm/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Integer underflow

EUVDB-ID: #VU91672

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26921

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the nf_ct_frag6_queue() and nf_ct_frag6_gather() functions in net/ipv6/netfilter/nf_conntrack_reasm.c, within the ip_frag_queue() and ip_defrag() functions in net/ipv4/ip_fragment.c, within the FRAG_CB(), inet_frag_queue_insert(), inet_frag_reasm_prepare(), EXPORT_SYMBOL() and inet_frag_reasm_finish() functions in net/ipv4/inet_fragment.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper locking

EUVDB-ID: #VU92035

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26923

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking within the unix_gc() function in net/unix/garbage.c due to garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use of Out-of-range Pointer Offset

EUVDB-ID: #VU91119

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26926

CWE-ID: CWE-823 - Use of Out-of-range Pointer Offset

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the binder_get_object() function in drivers/android/binder.c. A local user can influence the pointer offset and potentially execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU90169

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27395

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovs_ct_limit_exit() function in net/openvswitch/conntrack.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU90168

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27396

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_dellink() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU89672

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2024-27398

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the sco_sock_timeout() function in net/bluetooth/sco.c. A remote attacker can trigger a use-after-free error and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-source: before 4.19.90-2405.4.0.0277

python3-perf: before 4.19.90-2405.4.0.0277

python3-perf-debuginfo: before 4.19.90-2405.4.0.0277

bpftool-debuginfo: before 4.19.90-2405.4.0.0277

perf-debuginfo: before 4.19.90-2405.4.0.0277

kernel-devel: before 4.19.90-2405.4.0.0277

perf: before 4.19.90-2405.4.0.0277

kernel-debuginfo: before 4.19.90-2405.4.0.0277

kernel-tools-devel: before 4.19.90-2405.4.0.0277

bpftool: before 4.19.90-2405.4.0.0277

python2-perf-debuginfo: before 4.19.90-2405.4.0.0277

python2-perf: before 4.19.90-2405.4.0.0277

kernel-debugsource: before 4.19.90-2405.4.0.0277

kernel-tools: before 4.19.90-2405.4.0.0277

kernel-tools-debuginfo: before 4.19.90-2405.4.0.0277

kernel: before 4.19.90-2405.4.0.0277

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1652


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###