openEuler 20.03 LTS SP4 update for kernel



Published: 2024-07-08
Risk Medium
Patch available YES
Number of vulnerabilities 63
CVE-ID CVE-2021-47082
CVE-2021-47110
CVE-2021-47184
CVE-2022-48674
CVE-2023-52615
CVE-2023-52620
CVE-2023-52623
CVE-2023-52629
CVE-2023-52635
CVE-2023-52637
CVE-2023-52638
CVE-2023-52639
CVE-2023-52642
CVE-2023-52644
CVE-2023-6270
CVE-2024-24858
CVE-2024-26614
CVE-2024-26642
CVE-2024-26645
CVE-2024-26668
CVE-2024-26671
CVE-2024-26675
CVE-2024-26679
CVE-2024-26685
CVE-2024-26686
CVE-2024-26697
CVE-2024-26720
CVE-2024-26726
CVE-2024-26733
CVE-2024-26735
CVE-2024-26739
CVE-2024-26740
CVE-2024-26743
CVE-2024-26744
CVE-2024-26752
CVE-2024-26754
CVE-2024-26763
CVE-2024-26791
CVE-2024-26793
CVE-2024-26801
CVE-2024-26804
CVE-2024-26805
CVE-2024-26812
CVE-2024-26813
CVE-2024-26817
CVE-2024-26828
CVE-2024-26839
CVE-2024-26840
CVE-2024-26846
CVE-2024-26852
CVE-2024-26857
CVE-2024-26859
CVE-2024-26863
CVE-2024-26872
CVE-2024-26875
CVE-2024-26876
CVE-2024-26878
CVE-2024-26880
CVE-2024-26897
CVE-2024-26898
CVE-2024-26915
CVE-2024-26922
CVE-2024-27074
CWE-ID CWE-415
CWE-119
CWE-476
CWE-416
CWE-667
CWE-284
CWE-362
CWE-269
CWE-835
CWE-399
CWE-682
CWE-190
CWE-20
CWE-200
CWE-369
CWE-125
CWE-908
CWE-191
CWE-401
CWE-665
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
openEuler
Operating systems & Components / Operating system

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 63 vulnerabilities.

1) Double Free

EUVDB-ID: #VU89391

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47082

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in drivers/net/tun.c. A local user can trigger a double free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU91208

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47110

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the kvm_crash_shutdown() and kvmclock_init() functions in arch/x86/kernel/kvmclock.c, within the kvm_guest_cpu_offline() function in arch/x86/kernel/kvm.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU90587

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47184

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the i40e_sync_filters_subtask() and i40e_vsi_release() functions in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU90174

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48674

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the fs/erofs/internal.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU90798

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52615

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rng_get_data() and rng_dev_read() functions in drivers/char/hw_random/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper access control

EUVDB-ID: #VU89268

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52620

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c when setting timeouts from userspace. A local user can bypass implemented security restrictions and perform a denial of service attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper locking

EUVDB-ID: #VU92046

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52623

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the xprt_iter_current_entry() and rpc_xprt_switch_has_addr() functions in net/sunrpc/xprtmultipath.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU90221

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52629

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the switch_drv_remove() function in arch/sh/drivers/push-switch.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper locking

EUVDB-ID: #VU92045

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52635

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the devfreq_monitor(), devfreq_monitor_start() and devfreq_monitor_stop() functions in drivers/devfreq/devfreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU90218

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52637

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the j1939_sk_match_dst(), j1939_sk_match_filter(), j1939_sk_init() and j1939_sk_setsockopt() functions in net/can/j1939/socket.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Improper locking

EUVDB-ID: #VU90796

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52638

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the j1939_jsk_add(), j1939_sk_recv_match(), j1939_sk_recv(), j1939_sk_errqueue() and j1939_sk_netdev_event_netdown() functions in net/can/j1939/socket.c, within the j1939_netdev_start() function in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Race condition

EUVDB-ID: #VU91483

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52639

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the gmap_shadow() function in arch/s390/mm/gmap.c, within the acquire_gmap_shadow() function in arch/s390/kvm/vsie.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper privilege management

EUVDB-ID: #VU93736

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52642

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the lirc_dev_exit() and rc_dev_get_from_fd() functions in drivers/media/rc/lirc_dev.c, within the lirc_prog_attach(), lirc_prog_detach() and lirc_prog_query() functions in drivers/media/rc/bpf-lirc.c. A local user can read and manipulate data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Infinite loop

EUVDB-ID: #VU93068

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52644

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the b43_dma_tx() and b43_dma_handle_txstatus() functions in drivers/net/wireless/broadcom/b43/dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free

EUVDB-ID: #VU91599

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6270

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the aoecmd_cfg_pkts() function in the ATA over Ethernet (AoE) driver. A local user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Race condition

EUVDB-ID: #VU92720

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-24858

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Resource management error

EUVDB-ID: #VU91320

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26614

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the reqsk_queue_alloc() function in net/core/request_sock.c. A remote attacker can send specially crafted ACK packets to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Improper access control

EUVDB-ID: #VU88150

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26642

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c. A local user can set arbitrary timeouts, which can result in a denial of service condition.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Incorrect calculation

EUVDB-ID: #VU93762

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26645

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the __tracing_map_insert() function in kernel/trace/tracing_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Integer overflow

EUVDB-ID: #VU91180

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26668

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the nft_limit_eval() and nft_limit_init() functions in net/netfilter/nft_limit.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Buffer overflow

EUVDB-ID: #VU92977

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26671

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the blk_mq_mark_tag_wait() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Input validation error

EUVDB-ID: #VU90858

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26675

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ppp_async_ioctl() function in drivers/net/ppp/ppp_async.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU92044

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26679

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the EXPORT_SYMBOL() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Race condition

EUVDB-ID: #VU91481

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26685

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the nilfs_segctor_prepare_write(), nilfs_abort_logs() and nilfs_segctor_complete_write() functions in fs/nilfs2/segment.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper locking

EUVDB-ID: #VU91530

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26686

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the do_task_stat() function in fs/proc/array.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Information disclosure

EUVDB-ID: #VU91365

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26697

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the nilfs_prepare_segment_for_recovery(), nilfs_recovery_copy_block() and nilfs_recover_dsync_blocks() functions in fs/nilfs2/recovery.c. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Division by zero

EUVDB-ID: #VU91379

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26720

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the wb_dirty_limits() function in mm/page-writeback.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Improper locking

EUVDB-ID: #VU90791

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26726

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the clear_extent_uptodate() function in fs/btrfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Buffer overflow

EUVDB-ID: #VU92952

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26733

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the arp_req_get() function in net/ipv4/arp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use-after-free

EUVDB-ID: #VU90215

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26735

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the seg6_init() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Use-after-free

EUVDB-ID: #VU90214

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26739

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tcf_mirred_to_dev() function in net/sched/act_mirred.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Improper locking

EUVDB-ID: #VU90789

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26740

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mirred_egress_to_ingress_tcp_test() function in tools/testing/selftests/net/forwarding/tc_actions.sh, within the is_mirred_nested() and tcf_mirred_to_dev() functions in net/sched/act_mirred.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Improper locking

EUVDB-ID: #VU92042

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26743

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qedr_create_user_qp() function in drivers/infiniband/hw/qedr/verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) NULL pointer dereference

EUVDB-ID: #VU90596

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26744

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the module_param() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Incorrect calculation

EUVDB-ID: #VU89392

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26752

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the l2tp_ip6_sendmsg() function in net/l2tp/l2tp_ip6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Use-after-free

EUVDB-ID: #VU90217

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26754

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_init() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Resource management error

EUVDB-ID: #VU93859

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26763

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources during authentication within the kcryptd_crypt_write_convert() function in drivers/md/dm-crypt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Out-of-bounds read

EUVDB-ID: #VU91098

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26791

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the btrfs_check_replace_dev_names() and btrfs_dev_replace_by_ioctl() functions in fs/btrfs/dev-replace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Use-after-free

EUVDB-ID: #VU90211

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26793

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_init() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Use-after-free

EUVDB-ID: #VU90209

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26801

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hci_error_reset() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use-after-free

EUVDB-ID: #VU90212

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26804

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tnl_update_pmtu(), ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Use of uninitialized resource

EUVDB-ID: #VU90879

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26805

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the netlink_group_mask() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Improper locking

EUVDB-ID: #VU91529

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26812

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_intx_handler() and vfio_pci_set_intx_trigger() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) NULL pointer dereference

EUVDB-ID: #VU90588

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26813

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vfio_platform_set_irq_unmask(), vfio_automasked_irq_handler(), vfio_irq_handler(), vfio_set_trigger(), vfio_platform_set_irq_trigger(), vfio_platform_set_irqs_ioctl(), vfio_platform_irq_init() and vfio_platform_irq_cleanup() functions in drivers/vfio/platform/vfio_platform_irq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Integer overflow

EUVDB-ID: #VU88544

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26817

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the kfd_ioctl_get_process_apertures_new() function in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Integer underflow

EUVDB-ID: #VU91674

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26828

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the parse_server_interfaces() function in fs/smb/client/smb2ops.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Memory leak

EUVDB-ID: #VU90471

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26839

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the init_credit_return() function in drivers/infiniband/hw/hfi1/pio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Memory leak

EUVDB-ID: #VU90005

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26840

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the kmem_cache_free() and cachefiles_daemon_unbind() functions in fs/cachefiles/bind.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Double free

EUVDB-ID: #VU90896

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26846

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the LIST_HEAD(), nvme_fc_free_lport(), nvme_fc_init_module(), device_destroy() and nvme_fc_delete_controllers() functions in drivers/nvme/host/fc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use-after-free

EUVDB-ID: #VU90194

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26852

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ip6_route_multipath_add() and list_for_each_entry_safe() functions in net/ipv6/route.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Use of uninitialized resource

EUVDB-ID: #VU90876

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26857

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the geneve_rx() function in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) NULL pointer dereference

EUVDB-ID: #VU90573

Risk: Low

CVSSv3.1: 3.2 [AV:L/AC:L/PR:L/UI:U/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26859

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Use of uninitialized resource

EUVDB-ID: #VU90877

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26863

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the hsr_get_node() function in net/hsr/hsr_framereg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Use-after-free

EUVDB-ID: #VU90199

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26872

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the srpt_add_one() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Use-after-free

EUVDB-ID: #VU90193

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26875

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pvr2_context_exit() function in drivers/media/usb/pvrusb2/pvrusb2-context.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Improper Initialization

EUVDB-ID: #VU91552

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26876

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the adv7511_probe() function in drivers/gpu/drm/bridge/adv7511/adv7511_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) NULL pointer dereference

EUVDB-ID: #VU90574

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26878

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dquot_mark_dquot_dirty(), __dquot_alloc_space(), dquot_alloc_inode(), EXPORT_SYMBOL(), dquot_claim_space_nodirty(), dquot_reclaim_space_nodirty(), __dquot_free_space(), dquot_free_inode() and __dquot_transfer() functions in fs/quota/dquot.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Resource management error

EUVDB-ID: #VU92988

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26880

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __dm_internal_suspend() and __dm_internal_resume() functions in drivers/md/dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) NULL pointer dereference

EUVDB-ID: #VU90580

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26897

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ath9k_wmi_event_tasklet() function in drivers/net/wireless/ath/ath9k/wmi.c, within the ath9k_tx_init() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c, within the ath9k_htc_probe_device() function in drivers/net/wireless/ath/ath9k/htc_drv_init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Use-after-free

EUVDB-ID: #VU90197

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26898

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tx() function in drivers/block/aoe/aoenet.c, within the aoecmd_cfg_pkts() function in drivers/block/aoe/aoecmd.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Buffer overflow

EUVDB-ID: #VU91311

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26915

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the vega20_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/vega20_ih.c, within the vega10_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/vega10_ih.c, within the tonga_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/tonga_ih.c, within the si_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/si_ih.c, within the navi10_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/navi10_ih.c, within the iceland_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/iceland_ih.c, within the cz_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/cz_ih.c, within the cik_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/cik_ih.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Input validation error

EUVDB-ID: #VU89054

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26922

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the amdgpu_vm_bo_insert_map(), amdgpu_vm_bo_map(), amdgpu_vm_bo_replace_map(), and amdgpu_vm_bo_clear_mappings() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c. A local user can pass specially crafted input to the driver and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Memory leak

EUVDB-ID: #VU90453

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27074

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the go7007_load_encoder() function in drivers/media/usb/go7007/go7007-driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

kernel-debuginfo: before 4.19.90-2405.3.0.0276

kernel-devel: before 4.19.90-2405.3.0.0276

bpftool: before 4.19.90-2405.3.0.0276

kernel-tools-debuginfo: before 4.19.90-2405.3.0.0276

python3-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf-debuginfo: before 4.19.90-2405.3.0.0276

python2-perf: before 4.19.90-2405.3.0.0276

bpftool-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools-devel: before 4.19.90-2405.3.0.0276

kernel-source: before 4.19.90-2405.3.0.0276

perf: before 4.19.90-2405.3.0.0276

kernel-debugsource: before 4.19.90-2405.3.0.0276

perf-debuginfo: before 4.19.90-2405.3.0.0276

kernel-tools: before 4.19.90-2405.3.0.0276

python3-perf: before 4.19.90-2405.3.0.0276

kernel: before 4.19.90-2405.3.0.0276

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1618


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###