openEuler 20.03 LTS SP4 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 7
CVE-ID CVE-2024-50125
CVE-2024-50167
CVE-2024-50168
CVE-2024-50251
CVE-2024-53057
CVE-2024-53131
CVE-2024-53142
CWE-ID CWE-416
CWE-401
CWE-682
CWE-476
CWE-908
Exploitation vector Local
Public exploit Public exploit code for vulnerability #4 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU99806

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50125

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SCO_CONN_TIMEOUT(), sco_sock_timeout() and sco_conn_del() functions in net/bluetooth/sco.c, within the bt_sock_unlink() function in net/bluetooth/af_bluetooth.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU100053

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50167

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the be_xmit() function in drivers/net/ethernet/emulex/benet/be_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU100054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50168

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sun3_82586_send_packet() function in drivers/net/ethernet/i825xx/sun3_82586.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Incorrect calculation

EUVDB-ID: #VU100202

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2024-50251

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the nft_payload_set_eval() function in net/netfilter/nft_payload.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

5) Use-after-free

EUVDB-ID: #VU100707

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer dereference

EUVDB-ID: #VU101226

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53131

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __nilfs_get_page_block() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use of uninitialized resource

EUVDB-ID: #VU101347

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53142

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the do_name() and do_copy() functions in init/initramfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.3.0.0308

python3-perf: before 4.19.90-2412.3.0.0308

python2-perf-debuginfo: before 4.19.90-2412.3.0.0308

python2-perf: before 4.19.90-2412.3.0.0308

perf-debuginfo: before 4.19.90-2412.3.0.0308

perf: before 4.19.90-2412.3.0.0308

kernel-tools-devel: before 4.19.90-2412.3.0.0308

kernel-tools-debuginfo: before 4.19.90-2412.3.0.0308

kernel-tools: before 4.19.90-2412.3.0.0308

kernel-source: before 4.19.90-2412.3.0.0308

kernel-devel: before 4.19.90-2412.3.0.0308

kernel-debugsource: before 4.19.90-2412.3.0.0308

kernel-debuginfo: before 4.19.90-2412.3.0.0308

bpftool-debuginfo: before 4.19.90-2412.3.0.0308

bpftool: before 4.19.90-2412.3.0.0308

kernel: before 4.19.90-2412.3.0.0308

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###