Anolis OS update for kernel



Risk Medium
Patch available YES
Number of vulnerabilities 107
CVE-ID CVE-2019-13631
CVE-2019-15505
CVE-2019-25162
CVE-2020-25656
CVE-2020-36777
CVE-2021-3753
CVE-2021-4204
CVE-2021-46934
CVE-2021-47013
CVE-2021-47055
CVE-2021-47118
CVE-2021-47153
CVE-2021-47171
CVE-2021-47185
CVE-2022-0500
CVE-2022-23222
CVE-2022-3565
CVE-2022-45934
CVE-2022-48627
CVE-2022-48669
CVE-2023-1513
CVE-2023-24023
CVE-2023-25775
CVE-2023-28464
CVE-2023-31083
CVE-2023-3567
CVE-2023-37453
CVE-2023-38409
CVE-2023-39189
CVE-2023-39192
CVE-2023-39193
CVE-2023-39194
CVE-2023-39198
CVE-2023-4133
CVE-2023-4244
CVE-2023-42754
CVE-2023-42755
CVE-2023-45863
CVE-2023-51779
CVE-2023-51780
CVE-2023-52340
CVE-2023-52434
CVE-2023-52439
CVE-2023-52445
CVE-2023-52448
CVE-2023-52477
CVE-2023-52489
CVE-2023-52513
CVE-2023-52520
CVE-2023-52528
CVE-2023-52565
CVE-2023-52574
CVE-2023-52578
CVE-2023-52580
CVE-2023-52581
CVE-2023-52594
CVE-2023-52595
CVE-2023-52597
CVE-2023-52598
CVE-2023-52606
CVE-2023-52607
CVE-2023-52610
CVE-2023-52620
CVE-2023-6121
CVE-2023-6176
CVE-2023-6240
CVE-2023-6622
CVE-2023-6915
CVE-2023-6932
CVE-2024-0340
CVE-2024-0841
CVE-2024-23307
CVE-2024-25742
CVE-2024-25743
CVE-2024-25744
CVE-2024-26593
CVE-2024-26602
CVE-2024-26603
CVE-2024-26609
CVE-2024-26610
CVE-2024-26615
CVE-2024-26642
CVE-2024-26643
CVE-2024-26659
CVE-2024-26664
CVE-2024-26671
CVE-2024-26693
CVE-2024-26694
CVE-2024-26743
CVE-2024-26744
CVE-2024-26779
CVE-2024-26872
CVE-2024-26892
CVE-2024-26897
CVE-2024-26901
CVE-2024-26919
CVE-2024-26933
CVE-2024-26934
CVE-2024-26964
CVE-2024-26973
CVE-2024-26993
CVE-2024-27014
CVE-2024-27048
CVE-2024-27052
CVE-2024-27056
CVE-2024-27059
CVE-2022-48947
CWE-ID CWE-787
CWE-125
CWE-416
CWE-401
CWE-754
CWE-667
CWE-388
CWE-264
CWE-119
CWE-190
CWE-400
CWE-665
CWE-347
CWE-284
CWE-415
CWE-476
CWE-362
CWE-908
CWE-617
CWE-254
CWE-399
CWE-203
CWE-94
CWE-835
CWE-20
CWE-200
CWE-369
Exploitation vector Network
Public exploit Public exploit code for vulnerability #7 is available.
Public exploit code for vulnerability #16 is available.
Public exploit code for vulnerability #22 is available.
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

kernel-doc
Operating systems & Components / Operating system package or component

kernel-abi-stablelists
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-libs-devel
Operating systems & Components / Operating system package or component

kernel-tools-libs
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-modules-extra
Operating systems & Components / Operating system package or component

kernel-modules
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debug-modules-extra
Operating systems & Components / Operating system package or component

kernel-debug-modules
Operating systems & Components / Operating system package or component

kernel-debug-devel
Operating systems & Components / Operating system package or component

kernel-debug-core
Operating systems & Components / Operating system package or component

kernel-debug
Operating systems & Components / Operating system package or component

kernel-cross-headers
Operating systems & Components / Operating system package or component

kernel-core
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains information about 107 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU19576

Risk: Medium

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2019-13631

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local attacker to cause an out-of-bounds write condition on a targeted virtual host system.

The vulnerability exists due to the out-of-bounds write error in the "parse_hid_report_descriptor" function in the "drivers/input/tablet/gtco.c" file. A local authenticated attacker can insert a malicious USB device that sends a crafted response to the targeted system and cause an out-of-bounds write condition.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU21630

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-15505

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the drivers/media/usb/dvb-usb/technisat-usb2.c USB driver in Linux kernel. A local user can use a specially crafted USB device to trigger out-of-bounds read error during data transfer and read contents of memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU87986

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-25162

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the i2c_put_adapter() function in drivers/i2c/i2c-core-base.c. A local user can trigger a use-after-free error and crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU51547

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25656

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in the way the console subsystem uses KDGKBSENT and KDSKBSENT IOCTLs. A local user can run a specially crafted program to trigger an out-of-bounds read and gain access to sensitive information.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU87987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-36777

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dvb_media_device_free() function in drivers/media/dvb-core/dvbdev.c. A local user can crash the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU64210

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-3753

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel. A local user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds read

EUVDB-ID: #VU86247

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2021-4204

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: Yes

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary condition in Linux kernel eBPF. A local user trigger an out-of-bounds read error and read contents of memory on the system or crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

8) Improper Check for Unusual or Exceptional Conditions

EUVDB-ID: #VU89264

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-46934

CWE-ID: CWE-754 - Improper Check for Unusual or Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a local user to produce warnings from the userspace.

The vulnerability exists due to improper error handling within the compat_i2cdev_ioctl() function in drivers/i2c/i2c-dev.c. A local user can pass specially crafted data to the driver and influence its behavior.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU91068

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47013

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the emac_mac_tx_buf_send() function in drivers/net/ethernet/qualcomm/emac/emac-mac.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper locking

EUVDB-ID: #VU91543

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47055

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mtdchar_ioctl() function in drivers/mtd/mtdchar.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU90225

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47118

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the kernel_init_freeable() function in init/main.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Improper error handling

EUVDB-ID: #VU92059

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47153

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the i801_check_post() function in drivers/i2c/busses/i2c-i801.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU90011

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47171

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the smsc75xx_bind() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Improper locking

EUVDB-ID: #VU91528

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47185

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the flush_to_ldisc() function in drivers/tty/tty_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Out-of-bounds write

EUVDB-ID: #VU65298

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-0500

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in unrestricted eBPF usage by the BPF_BTF_LOAD in Linux kernel. A local user can trigger an out-of-bounds write error in BPF subsystem and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Security restrictions bypass

EUVDB-ID: #VU59896

Risk: Low

CVSSv4.0: 6.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2022-23222

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to availability of pointer arithmetic via certain *_OR_NULL pointer types in kernel/bpf/verifier.c in the Linux kernel. A local user can run a specially crafted program to execute arbitrary code with root privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

17) Buffer overflow

EUVDB-ID: #VU69709

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-3565

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the del_timer() function in drivers/isdn/mISDN/l1oip_core.c in the Bluetooth component. An attacker with physical proximity to device can trigger memory corruption and execute arbitrary code on the target system.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Integer overflow

EUVDB-ID: #VU70464

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-45934

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the l2cap_config_req() function in net/bluetooth/l2cap_core.c in Linux kernel. A local user can pass specially crafted L2CAP_CONF_REQ packets to the device, trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Resource exhaustion

EUVDB-ID: #VU92194

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48627

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Memory leak

EUVDB-ID: #VU90457

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48669

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the arch/powerpc/platforms/pseries/papr_platform_attributes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Improper Initialization

EUVDB-ID: #VU74630

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-1513

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper initialization when calling the KVM_GET_DEBUGREGS ioctl on 32-bit systems. A local user can run a specially crafted application to gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper Verification of Cryptographic Signature

EUVDB-ID: #VU83116

Risk: Medium

CVSSv4.0: 6.7 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2023-24023

CWE-ID: CWE-347 - Improper Verification of Cryptographic Signature

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a MitM attack.

The vulnerability exists due to improper verification of cryptographic signature in bluetooth implementation. A remote attacker with physical proximity to the system can perform MitM attack and potentially compromise the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

23) Improper access control

EUVDB-ID: #VU79371

Risk: Medium

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-25775

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in the Intel Ethernet Controller RDMA driver for Linux. A remote non-authenticated attacker can bypass implemented security restrictions and gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Double Free

EUVDB-ID: #VU74147

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-28464

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the hci_conn_cleanup() function in net/bluetooth/hci_conn.c in Linux kernel. A local user can trigger a double free error and execute arbitrary code with elevated privileges.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) NULL pointer dereference

EUVDB-ID: #VU79496

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-31083

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the hci_uart_tty_ioctl() function in drivers/bluetooth/hci_ldisc.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use-after-free

EUVDB-ID: #VU79491

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-3567

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vc_screen() function in vcs_read in drivers/tty/vt/vc_screen.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Out-of-bounds read

EUVDB-ID: #VU80795

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-37453

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the read_descriptors() function in drivers/usb/core/sysfs.c. An attacker with physical access to the system can attach a malicious USB device, trigger an out-of-bounds read error and crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Buffer overflow

EUVDB-ID: #VU79497

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-38409

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the set_con2fb_map() function in drivers/video/fbdev/core/fbcon.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Out-of-bounds read

EUVDB-ID: #VU82659

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39189

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary condition within the nfnl_osf_add_callback() function in Linux kernel Netfilter. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Out-of-bounds read

EUVDB-ID: #VU81921

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39192

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary condition within the the u32_match_it() function in Netfilter subsystem in Linux kernel. A local user can trigger an out-of-bounds read error and gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Out-of-bounds read

EUVDB-ID: #VU81920

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39193

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the sctp_mt_check() function in Netfilter subsystem in Linux kernel. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Out-of-bounds read

EUVDB-ID: #VU81919

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39194

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the XFRM subsystem in Linux kernel. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Use-after-free

EUVDB-ID: #VU83904

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39198

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the QXL driver in the Linux kernel. A local privileged user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use-after-free

EUVDB-ID: #VU79927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-4133

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the cxgb4 driver in the Linux kernel. A local user can trigger a use-after-free and crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Use-after-free

EUVDB-ID: #VU82306

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-4244

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Linux kernel netfilter: nf_tables component. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) NULL pointer dereference

EUVDB-ID: #VU81452

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-42754

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the ipv4_send_dest_unreach() function in net/ipv4/route.c. A local user with CAP_NET_ADMIN permissions can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Out-of-bounds read

EUVDB-ID: #VU82305

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-42755

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the the IPv4 Resource Reservation Protocol (RSVP) classifier function in the Linux kernel. A local user can trigger an out-of-bounds read error and crash the Linux kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Out-of-bounds write

EUVDB-ID: #VU84354

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-45863

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the fill_kobj_path() function in lib/kobject.c. A local user can can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Use-after-free

EUVDB-ID: #VU85023

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-51779

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when handling bt_sock_ioctl in the Bluetooth subsystem. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Race condition

EUVDB-ID: #VU85024

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-51780

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in the ATM (Asynchronous Transfer Mode) subsystem in Linux kernel. A local user can exploit the race and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Resource exhaustion

EUVDB-ID: #VU88378

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-52340

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error when processing very large ICMPv6 packets. A remote attacker can send a flood of IPv6 ICMP6 PTB messages, cause the high lock contention and increased CPU usage, leading to a denial of service.

Successful vulnerability exploitation requires a attacker to be on the local network or have a high bandwidth connection.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Buffer overflow

EUVDB-ID: #VU88283

Risk: Medium

CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-52434

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Use-after-free

EUVDB-ID: #VU87573

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52439

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uio_open() function in drivers/uio/uio.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Use-after-free

EUVDB-ID: #VU87745

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52445

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in pvrusb2. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) NULL pointer dereference

EUVDB-ID: #VU87741

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52448

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in gfs2_rgrp_dump() function. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Use of uninitialized resource

EUVDB-ID: #VU89393

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52477

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to usage of uninitialized BOS descriptors in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Race condition

EUVDB-ID: #VU89388

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52489

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) NULL pointer dereference

EUVDB-ID: #VU91242

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52513

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the siw_accept_newconn(), siw_cm_work_handler() and siw_cm_llp_data_ready() functions in drivers/infiniband/sw/siw/siw_cm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Memory leak

EUVDB-ID: #VU91656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52520

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tlmi_release_attr() and tlmi_sysfs_init() functions in drivers/platform/x86/think-lmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use of uninitialized resource

EUVDB-ID: #VU90884

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52528

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the __smsc75xx_read_reg() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Out-of-bounds read

EUVDB-ID: #VU90351

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52565

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the uvc_query_v4l2_menu() function in drivers/media/usb/uvc/uvc_ctrl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) NULL pointer dereference

EUVDB-ID: #VU89390

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52574

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in drivers/net/team/team.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Race condition

EUVDB-ID: #VU89384

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52578

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a data race within the br_handle_frame_finish() function in net/bridge/br_input.c. A local user can exploit the race and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Reachable Assertion

EUVDB-ID: #VU89383

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-52580

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in net/core/flow_dissector.c. A remote attacker on the local network can send specially crafted PTP ethernet frames to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Memory leak

EUVDB-ID: #VU89385

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52581

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak within the nft_trans_gc_space() function in net/netfilter/nf_tables_api.c. A local user can force the system to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Out-of-bounds read

EUVDB-ID: #VU90343

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52594

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ath9k_htc_txstatus() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Improper locking

EUVDB-ID: #VU90803

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52595

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rt2x00mac_bss_info_changed() function in drivers/net/wireless/ralink/rt2x00/rt2x00mac.c, within the rt2x00lib_disable_radio(), rt2x00lib_start() and rt2x00lib_stop() functions in drivers/net/wireless/ralink/rt2x00/rt2x00dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Security features bypass

EUVDB-ID: #VU92172

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52597

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A local privileged can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Resource management error

EUVDB-ID: #VU93864

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52598

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources in arch/s390/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Buffer overflow

EUVDB-ID: #VU87343

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52606

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the fp/vmx code in powerpc/lib/sstep.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) NULL pointer dereference

EUVDB-ID: #VU90841

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52607

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pgtable_cache_add() function in arch/powerpc/mm/init-common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Memory leak

EUVDB-ID: #VU89382

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52610

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak in net/sched/act_ct.c. A local user can force the kernel to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Improper access control

EUVDB-ID: #VU89268

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52620

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c when setting timeouts from userspace. A local user can bypass implemented security restrictions and perform a denial of service attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Out-of-bounds read

EUVDB-ID: #VU84788

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-6121

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the NVMe-oF/TCP subsystem in the Linux kernel. A remote attacker can send specially crafted data to the system, trigger an out-of-bounds read error and read contents of memory.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) NULL pointer dereference

EUVDB-ID: #VU84096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6176

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Linux kernel API for the cryptographic algorithm scatterwalk functionality in scatterwalk_copychunks(). A local user can send a malicious packet with specific socket configuration and crash the OS kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Observable discrepancy

EUVDB-ID: #VU89003

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-6240

CWE-ID: CWE-203 - Observable discrepancy

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a timing discrepancy when handling RSA based TLS key exchanges. A remote attacker can perform a Marvin attack and gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) NULL pointer dereference

EUVDB-ID: #VU84512

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6622

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the nft_dynset_init() function in net/netfilter/nft_dynset.c in nf_tables. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) NULL pointer dereference

EUVDB-ID: #VU85423

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6915

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the ida_free() function in lib/idr.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Use-after-free

EUVDB-ID: #VU84585

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6932

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local authenticated user to execute arbitrary code.

The vulnerability exists due to a use-after-free error within the ipv4 igmp component in Linux kernel. A local authenticated user can trigger a use-after-free error and execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Improper Initialization

EUVDB-ID: #VU86579

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-0340

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper initialization within the vhost_new_msg() function in drivers/vhost/vhost.c in the Linux kernel vhost driver. A local user can run a specially crafted application to gain access to sensitive kernel information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) NULL pointer dereference

EUVDB-ID: #VU89389

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-0841

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the hugetlbfs_fill_super() function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Integer overflow

EUVDB-ID: #VU88102

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23307

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow in raid5_cache_count() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Code Injection

EUVDB-ID: #VU89087

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25742

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a malicious hypervisor to escalate privileges on the system.

The vulnerability exists due to improper input validation when handling interrupts. A malicious hypervisor can inject interrupt 0x80, which is used by Linux for legacy 32-bit system calls, and arbitrarily change the value stored in EAX while a SEV VM is running.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Code Injection

EUVDB-ID: #VU89086

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25743

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a malicious hypervisor to escalate privileges on the system.

The vulnerability exists due to improper input validation when handling interrupts. A malicious hypervisor can inject interrupt 0x80, which is used by Linux for legacy 32-bit system calls, and arbitrarily change the value stored in EAX while a SEV VM is running.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU87191

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25744

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to missing access restrictions related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c. An untrusted VMM can trigger int80 syscall handling at any given point and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Out-of-bounds read

EUVDB-ID: #VU89250

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26593

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the i801_block_transaction_by_block() function in drivers/i2c/busses/i2c-i801.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Resource exhaustion

EUVDB-ID: #VU87499

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26602

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper resource management in kernel/sched/membarrier.c. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Infinite loop

EUVDB-ID: #VU89248

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26603

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in arch/x86/kernel/fpu/signal.c. A local user can consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Input validation error

EUVDB-ID: #VU89269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26609

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to QUEUE/DROP verdict parameters are rejected within the nft_verdict_init() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Buffer overflow

EUVDB-ID: #VU89679

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26610

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the iwl_dbg_tlv_override_trig_node() function in drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) NULL pointer dereference

EUVDB-ID: #VU90627

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26615

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __smc_diag_dump() function in net/smc/smc_diag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Improper access control

EUVDB-ID: #VU88150

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26642

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c. A local user can set arbitrary timeouts, which can result in a denial of service condition.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Race condition

EUVDB-ID: #VU88135

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26643

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the nf_tables_unbind_set() function in net/netfilter/nf_tables_api.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Buffer overflow

EUVDB-ID: #VU93244

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26659

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the process_isoc_td() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Out-of-bounds read

EUVDB-ID: #VU90335

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26664

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the create_core_data() function in drivers/hwmon/coretemp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Buffer overflow

EUVDB-ID: #VU92977

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26671

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the blk_mq_mark_tag_wait() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Improper Initialization

EUVDB-ID: #VU91554

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26693

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the iwl_mvm_is_dup() function in drivers/net/wireless/intel/iwlwifi/mvm/rxmq.c, within the iwl_mvm_sta_state_notexist_to_none() function in drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Double free

EUVDB-ID: #VU90928

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26694

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the iwl_dealloc_ucode() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Improper locking

EUVDB-ID: #VU92042

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26743

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qedr_create_user_qp() function in drivers/infiniband/hw/qedr/verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) NULL pointer dereference

EUVDB-ID: #VU90596

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26744

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the module_param() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Race condition

EUVDB-ID: #VU91480

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26779

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the ieee80211_check_fast_xmit() function in net/mac80211/tx.c, within the sta_info_insert_finish() function in net/mac80211/sta_info.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Use-after-free

EUVDB-ID: #VU90199

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26872

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the srpt_add_one() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Use-after-free

EUVDB-ID: #VU90201

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26892

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mt792x_irq_handler() function in drivers/net/wireless/mediatek/mt76/mt792x_dma.c, within the mt7921_pci_remove() function in drivers/net/wireless/mediatek/mt76/mt7921/pci.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) NULL pointer dereference

EUVDB-ID: #VU90580

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26897

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ath9k_wmi_event_tasklet() function in drivers/net/wireless/ath/ath9k/wmi.c, within the ath9k_tx_init() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c, within the ath9k_htc_probe_device() function in drivers/net/wireless/ath/ath9k/htc_drv_init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Information disclosure

EUVDB-ID: #VU91363

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26901

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to information disclosure within the do_sys_name_to_handle() function in fs/fhandle.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Memory leak

EUVDB-ID: #VU91647

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26919

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ulpi_register() function in drivers/usb/common/ulpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Improper locking

EUVDB-ID: #VU90777

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26933

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to improper locking within the disable_show() and disable_store() functions in drivers/usb/core/port.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Improper locking

EUVDB-ID: #VU90776

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26934

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to improper locking within the interface_authorized_store() function in drivers/usb/core/sysfs.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) NULL pointer dereference

EUVDB-ID: #VU90561

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26964

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xhci_map_temp_buffer() function in drivers/usb/host/xhci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Information disclosure

EUVDB-ID: #VU91360

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26973

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the fat_encode_fh_nostale() function in fs/fat/nfs.c. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Information disclosure

EUVDB-ID: #VU91355

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26993

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the sysfs_break_active_protection() function in fs/sysfs/file.c. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Improper locking

EUVDB-ID: #VU90768

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27014

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mlx5e_arfs_enable(), arfs_del_rules(), arfs_handle_work() and mlx5e_rx_flow_steer() functions in drivers/net/ethernet/mellanox/mlx5/core/en_arfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) NULL pointer dereference

EUVDB-ID: #VU90524

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27048

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brcmf_pmksa_v3_op() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Use-after-free

EUVDB-ID: #VU90180

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27052

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rtl8xxxu_stop() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Resource management error

EUVDB-ID: #VU92983

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27056

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the iwl_mvm_sta_ensure_queue() function in drivers/net/wireless/intel/iwlwifi/mvm/sta.c, within the __iwl_mvm_suspend() function in drivers/net/wireless/intel/iwlwifi/mvm/d3.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Division by zero

EUVDB-ID: #VU91374

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27059

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the isd200_dump_driveid(), isd200_get_inquiry_data() and isd200_init_info() functions in drivers/usb/storage/isd200.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Buffer overflow

EUVDB-ID: #VU99095

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48947

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the l2cap_config_req() function in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

kernel-doc: before 4.18.0-553.5.1.0.1

kernel-abi-stablelists: before 4.18.0-553.5.1.0.1

python3-perf: before 4.18.0-553.5.1.0.1

perf: before 4.18.0-553.5.1.0.1

kernel-tools-libs-devel: before 4.18.0-553.5.1.0.1

kernel-tools-libs: before 4.18.0-553.5.1.0.1

kernel-tools: before 4.18.0-553.5.1.0.1

kernel-modules-extra: before 4.18.0-553.5.1.0.1

kernel-modules: before 4.18.0-553.5.1.0.1

kernel-headers: before 4.18.0-553.5.1.0.1

kernel-devel: before 4.18.0-553.5.1.0.1

kernel-debug-modules-extra: before 4.18.0-553.5.1.0.1

kernel-debug-modules: before 4.18.0-553.5.1.0.1

kernel-debug-devel: before 4.18.0-553.5.1.0.1

kernel-debug-core: before 4.18.0-553.5.1.0.1

kernel-debug: before 4.18.0-553.5.1.0.1

kernel-cross-headers: before 4.18.0-553.5.1.0.1

kernel-core: before 4.18.0-553.5.1.0.1

kernel: before 4.18.0-553.5.1.0.1

bpftool: before 4.18.0-553.5.1.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0462


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###