Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 107 |
CVE-ID | CVE-2019-13631 CVE-2019-15505 CVE-2019-25162 CVE-2020-25656 CVE-2020-36777 CVE-2021-3753 CVE-2021-4204 CVE-2021-46934 CVE-2021-47013 CVE-2021-47055 CVE-2021-47118 CVE-2021-47153 CVE-2021-47171 CVE-2021-47185 CVE-2022-0500 CVE-2022-23222 CVE-2022-3565 CVE-2022-45934 CVE-2022-48627 CVE-2022-48669 CVE-2023-1513 CVE-2023-24023 CVE-2023-25775 CVE-2023-28464 CVE-2023-31083 CVE-2023-3567 CVE-2023-37453 CVE-2023-38409 CVE-2023-39189 CVE-2023-39192 CVE-2023-39193 CVE-2023-39194 CVE-2023-39198 CVE-2023-4133 CVE-2023-4244 CVE-2023-42754 CVE-2023-42755 CVE-2023-45863 CVE-2023-51779 CVE-2023-51780 CVE-2023-52340 CVE-2023-52434 CVE-2023-52439 CVE-2023-52445 CVE-2023-52448 CVE-2023-52477 CVE-2023-52489 CVE-2023-52513 CVE-2023-52520 CVE-2023-52528 CVE-2023-52565 CVE-2023-52574 CVE-2023-52578 CVE-2023-52580 CVE-2023-52581 CVE-2023-52594 CVE-2023-52595 CVE-2023-52597 CVE-2023-52598 CVE-2023-52606 CVE-2023-52607 CVE-2023-52610 CVE-2023-52620 CVE-2023-6121 CVE-2023-6176 CVE-2023-6240 CVE-2023-6622 CVE-2023-6915 CVE-2023-6932 CVE-2024-0340 CVE-2024-0841 CVE-2024-23307 CVE-2024-25742 CVE-2024-25743 CVE-2024-25744 CVE-2024-26593 CVE-2024-26602 CVE-2024-26603 CVE-2024-26609 CVE-2024-26610 CVE-2024-26615 CVE-2024-26642 CVE-2024-26643 CVE-2024-26659 CVE-2024-26664 CVE-2024-26671 CVE-2024-26693 CVE-2024-26694 CVE-2024-26743 CVE-2024-26744 CVE-2024-26779 CVE-2024-26872 CVE-2024-26892 CVE-2024-26897 CVE-2024-26901 CVE-2024-26919 CVE-2024-26933 CVE-2024-26934 CVE-2024-26964 CVE-2024-26973 CVE-2024-26993 CVE-2024-27014 CVE-2024-27048 CVE-2024-27052 CVE-2024-27056 CVE-2024-27059 CVE-2022-48947 |
CWE-ID | CWE-787 CWE-125 CWE-416 CWE-401 CWE-754 CWE-667 CWE-388 CWE-264 CWE-119 CWE-190 CWE-400 CWE-665 CWE-347 CWE-284 CWE-415 CWE-476 CWE-362 CWE-908 CWE-617 CWE-254 CWE-399 CWE-203 CWE-94 CWE-835 CWE-20 CWE-200 CWE-369 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #7 is available. Public exploit code for vulnerability #16 is available. Public exploit code for vulnerability #22 is available. |
Vulnerable software |
Anolis OS Operating systems & Components / Operating system kernel-doc Operating systems & Components / Operating system package or component kernel-abi-stablelists Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-libs-devel Operating systems & Components / Operating system package or component kernel-tools-libs Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-modules-extra Operating systems & Components / Operating system package or component kernel-modules Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debug-modules-extra Operating systems & Components / Operating system package or component kernel-debug-modules Operating systems & Components / Operating system package or component kernel-debug-devel Operating systems & Components / Operating system package or component kernel-debug-core Operating systems & Components / Operating system package or component kernel-debug Operating systems & Components / Operating system package or component kernel-cross-headers Operating systems & Components / Operating system package or component kernel-core Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component |
Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 107 vulnerabilities.
EUVDB-ID: #VU19576
Risk: Medium
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-13631
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU21630
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-15505
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the drivers/media/usb/dvb-usb/technisat-usb2.c USB driver in Linux kernel. A local user can use a specially crafted USB device to trigger out-of-bounds read error during data transfer and read contents of memory on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-25162
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the i2c_put_adapter() function in drivers/i2c/i2c-core-base.c. A local user can trigger a use-after-free error and crash the kernel.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51547
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-25656
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in the way the console subsystem uses KDGKBSENT and KDSKBSENT IOCTLs. A local user can run a specially crafted program to trigger an out-of-bounds read and gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-36777
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dvb_media_device_free() function in drivers/media/dvb-core/dvbdev.c. A local user can crash the system.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64210
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3753
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel. A local user can trigger out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86247
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2021-4204
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition in Linux kernel eBPF. A local user trigger an out-of-bounds read error and read contents of memory on the system or crash the kernel.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU89264
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-46934
CWE-ID:
CWE-754 - Improper Check for Unusual or Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to produce warnings from the userspace.
The vulnerability exists due to improper error handling within the compat_i2cdev_ioctl() function in drivers/i2c/i2c-dev.c. A local user can pass specially crafted data to the driver and influence its behavior.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91068
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47013
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the emac_mac_tx_buf_send() function in drivers/net/ethernet/qualcomm/emac/emac-mac.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91543
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47055
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mtdchar_ioctl() function in drivers/mtd/mtdchar.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90225
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47118
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kernel_init_freeable() function in init/main.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92059
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47153
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the i801_check_post() function in drivers/i2c/busses/i2c-i801.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47171
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smsc75xx_bind() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91528
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47185
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the flush_to_ldisc() function in drivers/tty/tty_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65298
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0500
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in unrestricted eBPF usage by the BPF_BTF_LOAD in Linux kernel. A local user can trigger an out-of-bounds write error in BPF subsystem and execute arbitrary code with elevated privileges.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59896
Risk: Low
CVSSv4.0: 6.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2022-23222
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to availability of pointer arithmetic via certain *_OR_NULL pointer types in kernel/bpf/verifier.c in the Linux kernel. A local user can run a specially crafted program to execute arbitrary code with root privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU69709
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3565
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows an attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the del_timer() function in drivers/isdn/mISDN/l1oip_core.c in the Bluetooth component. An attacker with physical proximity to device can trigger memory corruption and execute arbitrary code on the target system.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70464
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-45934
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the l2cap_config_req() function in net/bluetooth/l2cap_core.c in Linux kernel. A local user can pass specially crafted L2CAP_CONF_REQ packets to the device, trigger an integer overflow and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92194
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48627
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90457
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48669
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the arch/powerpc/platforms/pseries/papr_platform_attributes.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74630
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-1513
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper initialization when calling the KVM_GET_DEBUGREGS ioctl on 32-bit systems. A local user can run a specially crafted application to gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83116
Risk: Medium
CVSSv4.0: 6.7 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2023-24023
CWE-ID:
CWE-347 - Improper Verification of Cryptographic Signature
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a MitM attack.
The vulnerability exists due to improper verification of cryptographic signature in bluetooth implementation. A remote attacker with physical proximity to the system can perform MitM attack and potentially compromise the system.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU79371
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-25775
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in the Intel Ethernet Controller RDMA driver for Linux. A remote non-authenticated attacker can bypass implemented security restrictions and gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74147
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-28464
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the hci_conn_cleanup() function in net/bluetooth/hci_conn.c in Linux kernel. A local user can trigger a double free error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79496
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-31083
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the hci_uart_tty_ioctl() function in drivers/bluetooth/hci_ldisc.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79491
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3567
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vc_screen() function in vcs_read in drivers/tty/vt/vc_screen.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80795
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-37453
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the read_descriptors() function in drivers/usb/core/sysfs.c. An attacker with physical access to the system can attach a malicious USB device, trigger an out-of-bounds read error and crash the kernel.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79497
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-38409
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the set_con2fb_map() function in drivers/video/fbdev/core/fbcon.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82659
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39189
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary condition within the nfnl_osf_add_callback() function in Linux kernel Netfilter. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81921
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39192
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition within the the u32_match_it() function in Netfilter subsystem in Linux kernel. A local user can trigger an out-of-bounds read error and gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81920
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39193
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the sctp_mt_check() function in Netfilter subsystem in Linux kernel. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81919
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39194
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the XFRM subsystem in Linux kernel. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83904
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39198
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the QXL driver in the Linux kernel. A local privileged user can trigger a use-after-free error and escalate privileges on the system.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4133
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the cxgb4 driver in the Linux kernel. A local user can trigger a use-after-free and crash the kernel.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82306
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4244
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the Linux kernel netfilter: nf_tables component. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81452
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-42754
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the ipv4_send_dest_unreach() function in net/ipv4/route.c. A local user with CAP_NET_ADMIN permissions can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82305
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-42755
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the the IPv4 Resource Reservation Protocol (RSVP) classifier function in the Linux kernel. A local user can trigger an out-of-bounds read error and crash the Linux kernel.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84354
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-45863
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the fill_kobj_path() function in lib/kobject.c. A local user can can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85023
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-51779
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error when handling bt_sock_ioctl in the Bluetooth subsystem. A local user can trigger a use-after-free error and execute arbitrary code on the system.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85024
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-51780
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in the ATM (Asynchronous Transfer Mode) subsystem in Linux kernel. A local user can exploit the race and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88378
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52340
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error when processing very large ICMPv6 packets. A remote attacker can send a flood of IPv6 ICMP6 PTB messages, cause the high lock contention and increased CPU usage, leading to a denial of service.
Successful vulnerability exploitation requires a attacker to be on the local network or have a high bandwidth connection.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88283
Risk: Medium
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52434
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87573
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52439
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uio_open() function in drivers/uio/uio.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87745
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52445
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in pvrusb2. A local user can execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87741
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52448
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in gfs2_rgrp_dump() function. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89393
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52477
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to usage of uninitialized BOS descriptors in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89388
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52489
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91242
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52513
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the siw_accept_newconn(), siw_cm_work_handler() and siw_cm_llp_data_ready() functions in drivers/infiniband/sw/siw/siw_cm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91656
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52520
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tlmi_release_attr() and tlmi_sysfs_init() functions in drivers/platform/x86/think-lmi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90884
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52528
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the __smsc75xx_read_reg() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90351
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52565
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the uvc_query_v4l2_menu() function in drivers/media/usb/uvc/uvc_ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89390
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52574
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in drivers/net/team/team.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89384
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52578
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a data race within the br_handle_frame_finish() function in net/bridge/br_input.c. A local user can exploit the race and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89383
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52580
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion in net/core/flow_dissector.c. A remote attacker on the local network can send specially crafted PTP ethernet frames to the system and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89385
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52581
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the nft_trans_gc_space() function in net/netfilter/nf_tables_api.c. A local user can force the system to leak memory and perform denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90343
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52594
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ath9k_htc_txstatus() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90803
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52595
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rt2x00mac_bss_info_changed() function in drivers/net/wireless/ralink/rt2x00/rt2x00mac.c, within the rt2x00lib_disable_radio(), rt2x00lib_start() and rt2x00lib_stop() functions in drivers/net/wireless/ralink/rt2x00/rt2x00dev.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92172
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52597
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a local privileged user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A local privileged can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93864
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52598
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources in arch/s390/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87343
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52606
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the fp/vmx code in powerpc/lib/sstep.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52607
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pgtable_cache_add() function in arch/powerpc/mm/init-common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89382
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52610
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak in net/sched/act_ct.c. A local user can force the kernel to leak memory and perform denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89268
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52620
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c when setting timeouts from userspace. A local user can bypass implemented security restrictions and perform a denial of service attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84788
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-6121
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the NVMe-oF/TCP subsystem in the Linux kernel. A remote attacker can send specially crafted data to the system, trigger an out-of-bounds read error and read contents of memory.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6176
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel API for the cryptographic algorithm scatterwalk functionality in scatterwalk_copychunks(). A local user can send a malicious packet with specific socket configuration and crash the OS kernel.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89003
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-6240
CWE-ID:
CWE-203 - Observable discrepancy
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a timing discrepancy when handling RSA based TLS key exchanges. A remote attacker can perform a Marvin attack and gain access to sensitive information. MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6622
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the nft_dynset_init() function in net/netfilter/nft_dynset.c in nf_tables. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85423
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6915
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the ida_free() function in lib/idr.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84585
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6932
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to execute arbitrary code.
The vulnerability exists due to a use-after-free error within the ipv4 igmp component in Linux kernel. A local authenticated user can trigger a use-after-free error and execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86579
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-0340
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper initialization within the vhost_new_msg() function in drivers/vhost/vhost.c in the Linux kernel vhost driver. A local user can run a specially crafted application to gain access to sensitive kernel information.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89389
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-0841
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the hugetlbfs_fill_super() function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88102
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-23307
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in raid5_cache_count() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89087
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-25742
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
Description
The vulnerability allows a malicious hypervisor to escalate privileges on the system.
The vulnerability exists due to improper input validation when handling interrupts. A malicious hypervisor can inject interrupt 0x80, which is used by Linux for legacy 32-bit system calls, and arbitrarily change the value stored in EAX while a SEV VM is running.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89086
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-25743
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a malicious hypervisor to escalate privileges on the system.
The vulnerability exists due to improper input validation when handling interrupts. A malicious hypervisor can inject interrupt 0x80, which is used by Linux for legacy 32-bit system calls, and arbitrarily change the value stored in EAX while a SEV VM is running.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-25744
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to missing access restrictions related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c. An untrusted VMM can trigger int80 syscall handling at any given point and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89250
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26593
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the i801_block_transaction_by_block() function in drivers/i2c/busses/i2c-i801.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87499
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26602
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper resource management in kernel/sched/membarrier.c. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26603
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in arch/x86/kernel/fpu/signal.c. A local user can consume all available system resources and cause denial of service conditions.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26609
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to QUEUE/DROP verdict parameters are rejected within the nft_verdict_init() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89679
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26610
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the iwl_dbg_tlv_override_trig_node() function in drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90627
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26615
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __smc_diag_dump() function in net/smc/smc_diag.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88150
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26642
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c. A local user can set arbitrary timeouts, which can result in a denial of service condition.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88135
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26643
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the nf_tables_unbind_set() function in net/netfilter/nf_tables_api.c. A local user can exploit the race and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26659
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the process_isoc_td() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90335
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26664
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the create_core_data() function in drivers/hwmon/coretemp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92977
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26671
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the blk_mq_mark_tag_wait() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91554
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26693
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the iwl_mvm_is_dup() function in drivers/net/wireless/intel/iwlwifi/mvm/rxmq.c, within the iwl_mvm_sta_state_notexist_to_none() function in drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26694
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the iwl_dealloc_ucode() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92042
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26743
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qedr_create_user_qp() function in drivers/infiniband/hw/qedr/verbs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90596
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26744
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the module_param() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91480
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26779
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the ieee80211_check_fast_xmit() function in net/mac80211/tx.c, within the sta_info_insert_finish() function in net/mac80211/sta_info.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90199
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26872
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the srpt_add_one() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90201
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26892
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mt792x_irq_handler() function in drivers/net/wireless/mediatek/mt76/mt792x_dma.c, within the mt7921_pci_remove() function in drivers/net/wireless/mediatek/mt76/mt7921/pci.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90580
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26897
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ath9k_wmi_event_tasklet() function in drivers/net/wireless/ath/ath9k/wmi.c, within the ath9k_tx_init() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c, within the ath9k_htc_probe_device() function in drivers/net/wireless/ath/ath9k/htc_drv_init.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91363
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26901
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to information disclosure within the do_sys_name_to_handle() function in fs/fhandle.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91647
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26919
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ulpi_register() function in drivers/usb/common/ulpi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90777
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26933
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to improper locking within the disable_show() and disable_store() functions in drivers/usb/core/port.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90776
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26934
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to improper locking within the interface_authorized_store() function in drivers/usb/core/sysfs.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90561
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26964
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xhci_map_temp_buffer() function in drivers/usb/host/xhci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91360
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26973
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the fat_encode_fh_nostale() function in fs/fat/nfs.c. A local user can gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91355
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26993
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the sysfs_break_active_protection() function in fs/sysfs/file.c. A local user can gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90768
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27014
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mlx5e_arfs_enable(), arfs_del_rules(), arfs_handle_work() and mlx5e_rx_flow_steer() functions in drivers/net/ethernet/mellanox/mlx5/core/en_arfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90524
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27048
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcmf_pmksa_v3_op() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90180
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27052
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtl8xxxu_stop() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27056
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iwl_mvm_sta_ensure_queue() function in drivers/net/wireless/intel/iwlwifi/mvm/sta.c, within the __iwl_mvm_suspend() function in drivers/net/wireless/intel/iwlwifi/mvm/d3.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91374
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27059
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the isd200_dump_driveid(), isd200_get_inquiry_data() and isd200_init_info() functions in drivers/usb/storage/isd200.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99095
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48947
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the l2cap_config_req() function in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
kernel-doc: before 4.18.0-553.5.1.0.1
kernel-abi-stablelists: before 4.18.0-553.5.1.0.1
python3-perf: before 4.18.0-553.5.1.0.1
perf: before 4.18.0-553.5.1.0.1
kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1
kernel-tools-libs: before 4.18.0-553.5.1.0.1
kernel-tools: before 4.18.0-553.5.1.0.1
kernel-modules-extra: before 4.18.0-553.5.1.0.1
kernel-modules: before 4.18.0-553.5.1.0.1
kernel-headers: before 4.18.0-553.5.1.0.1
kernel-devel: before 4.18.0-553.5.1.0.1
kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1
kernel-debug-modules: before 4.18.0-553.5.1.0.1
kernel-debug-devel: before 4.18.0-553.5.1.0.1
kernel-debug-core: before 4.18.0-553.5.1.0.1
kernel-debug: before 4.18.0-553.5.1.0.1
kernel-cross-headers: before 4.18.0-553.5.1.0.1
kernel-core: before 4.18.0-553.5.1.0.1
kernel: before 4.18.0-553.5.1.0.1
bpftool: before 4.18.0-553.5.1.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2024:0462
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.