openEuler 22.03 LTS SP3 update for kernel



| Updated: 2025-03-14
Risk Medium
Patch available YES
Number of vulnerabilities 33
CVE-ID CVE-2023-52615
CVE-2023-52621
CVE-2023-52623
CVE-2023-52629
CVE-2023-52635
CVE-2023-52655
CVE-2023-52675
CVE-2023-52676
CVE-2023-52685
CVE-2023-52690
CVE-2023-52694
CVE-2024-26610
CVE-2024-26661
CVE-2024-26675
CVE-2024-26686
CVE-2024-26702
CVE-2024-26712
CVE-2024-26825
CVE-2024-26851
CVE-2024-26900
CVE-2024-26901
CVE-2024-26903
CVE-2024-26923
CVE-2024-26926
CVE-2024-26937
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27431
CVE-2024-35791
CVE-2024-35845
CVE-2024-35849
CVE-2024-35943
CWE-ID CWE-667
CWE-617
CWE-416
CWE-119
CWE-476
CWE-190
CWE-401
CWE-399
CWE-20
CWE-125
CWE-200
CWE-823
CWE-908
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #28 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

kernel-debugsource
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 33 vulnerabilities.

1) Improper locking

EUVDB-ID: #VU90798

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52615

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rng_get_data() and rng_dev_read() functions in drivers/char/hw_random/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Reachable assertion

EUVDB-ID: #VU90912

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52621

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the rcu_read_lock_held(), BPF_CALL_4() and BPF_CALL_2() functions in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU92046

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52623

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the xprt_iter_current_entry() and rpc_xprt_switch_has_addr() functions in net/sunrpc/xprtmultipath.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU90221

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52629

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the switch_drv_remove() function in arch/sh/drivers/push-switch.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU92045

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52635

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the devfreq_monitor(), devfreq_monitor_start() and devfreq_monitor_stop() functions in drivers/devfreq/devfreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer overflow

EUVDB-ID: #VU93242

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52655

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the aqc111_rx_fixup() function in drivers/net/usb/aqc111.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) NULL pointer dereference

EUVDB-ID: #VU90547

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52675

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the update_events_in_group() function in arch/powerpc/perf/imc-pmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Integer overflow

EUVDB-ID: #VU93061

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52676

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the check_ptr_to_map_access() and check_stack_access_within_bounds() functions in kernel/bpf/verifier.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Buffer overflow

EUVDB-ID: #VU91437

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52685

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the persistent_ram_init_ecc() function in fs/pstore/ram_core.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Memory leak

EUVDB-ID: #VU89981

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52690

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the scom_debug_init_one() function in arch/powerpc/platforms/powernv/opal-xscom.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Resource management error

EUVDB-ID: #VU91606

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52694

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the tpd12s015_probe() function in drivers/gpu/drm/bridge/ti-tpd12s015.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer overflow

EUVDB-ID: #VU89679

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26610

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the iwl_dbg_tlv_override_trig_node() function in drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Resource management error

EUVDB-ID: #VU93260

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26661

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dcn21_set_abm_immediate_disable() function in drivers/gpu/drm/amd/display/dc/dcn21/dcn21_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Input validation error

EUVDB-ID: #VU90858

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26675

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ppp_async_ioctl() function in drivers/net/ppp/ppp_async.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU91530

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26686

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the do_task_stat() function in fs/proc/array.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds read

EUVDB-ID: #VU91100

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26702

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the rm3100_common_probe() function in drivers/iio/magnetometer/rm3100-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Buffer overflow

EUVDB-ID: #VU93400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26712

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the kasan_init_region() function in arch/powerpc/mm/kasan/kasan_init_32.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory leak

EUVDB-ID: #VU93765

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26825

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nci_free_device() function in net/nfc/nci/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Out-of-bounds read

EUVDB-ID: #VU91096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26851

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the decode_seq() function in net/netfilter/nf_conntrack_h323_asn1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Memory leak

EUVDB-ID: #VU90468

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26900

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bind_rdev_to_array() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Information disclosure

EUVDB-ID: #VU91363

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26901

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to information disclosure within the do_sys_name_to_handle() function in fs/fhandle.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) NULL pointer dereference

EUVDB-ID: #VU92070

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26903

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rfcomm_process_rx() function in net/bluetooth/rfcomm/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU92035

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26923

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking within the unix_gc() function in net/unix/garbage.c due to garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use of Out-of-range Pointer Offset

EUVDB-ID: #VU91119

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26926

CWE-ID: CWE-823 - Use of Out-of-range Pointer Offset

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the binder_get_object() function in drivers/android/binder.c. A local user can influence the pointer offset and potentially execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Reachable assertion

EUVDB-ID: #VU90909

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26937

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the gen11_emit_fini_breadcrumb_rcs() function in drivers/gpu/drm/i915/gt/intel_lrc.c, within the __engine_park() function in drivers/gpu/drm/i915/gt/intel_engine_pm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use-after-free

EUVDB-ID: #VU90169

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27395

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovs_ct_limit_exit() function in net/openvswitch/conntrack.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Use-after-free

EUVDB-ID: #VU90168

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27396

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_dellink() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Use-after-free

EUVDB-ID: #VU89672

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2024-27398

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the sco_sock_timeout() function in net/bluetooth/sco.c. A remote attacker can trigger a use-after-free error and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

29) Use of uninitialized resource

EUVDB-ID: #VU92003

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27431

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the cpu_map_bpf_prog_run_xdp() function in kernel/bpf/cpumap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use-after-free

EUVDB-ID: #VU90165

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35791

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svm_register_enc_region() function in arch/x86/kvm/svm/sev.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Input validation error

EUVDB-ID: #VU91609

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35845

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the iwl_dbg_tlv_alloc_debug_info() function in drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Information disclosure

EUVDB-ID: #VU91345

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35849

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the init_data_container() function in fs/btrfs/backref.c. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) NULL pointer dereference

EUVDB-ID: #VU90544

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35943

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the omap_prm_domain_init() function in drivers/pmdomain/ti/omap_prm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-debugsource: before 5.10.0-200.0.0.113

perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools: before 5.10.0-200.0.0.113

perf: before 5.10.0-200.0.0.113

kernel-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-debuginfo: before 5.10.0-200.0.0.113

python3-perf-debuginfo: before 5.10.0-200.0.0.113

kernel-tools-devel: before 5.10.0-200.0.0.113

kernel-devel: before 5.10.0-200.0.0.113

python3-perf: before 5.10.0-200.0.0.113

kernel-headers: before 5.10.0-200.0.0.113

kernel-source: before 5.10.0-200.0.0.113

kernel: before 5.10.0-200.0.0.113

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###