openEuler 22.03 LTS SP1 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 26
CVE-ID CVE-2022-48878
CVE-2022-48953
CVE-2022-49026
CVE-2024-35833
CVE-2024-36005
CVE-2024-36950
CVE-2024-43911
CVE-2024-47663
CVE-2024-47666
CVE-2024-47728
CVE-2024-49914
CVE-2024-49945
CVE-2024-49963
CVE-2024-49982
CVE-2024-50099
CVE-2024-50115
CVE-2024-50138
CVE-2024-50184
CVE-2024-50195
CVE-2024-50198
CVE-2024-50237
CVE-2024-50242
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2023-6270
CWE-ID CWE-416
CWE-399
CWE-415
CWE-401
CWE-388
CWE-476
CWE-369
CWE-667
CWE-125
CWE-908
CWE-20
CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 26 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU96332

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48878

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qca_serdev_shutdown() function in drivers/bluetooth/hci_qca.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU99139

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48953

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cmos_check_acpi_rtc_status(), cmos_pnp_probe(), cmos_of_init() and cmos_platform_probe() functions in drivers/rtc/rtc-cmos.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Double free

EUVDB-ID: #VU99054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49026

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the e100_xmit_prepare() function in drivers/net/ethernet/intel/e100.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU89986

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35833

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the drivers/dma/fsl-qdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource management error

EUVDB-ID: #VU93190

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36005

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nft_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper error handling

EUVDB-ID: #VU92055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36950

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) NULL pointer dereference

EUVDB-ID: #VU96523

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43911

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ieee80211_start_tx_ba_session() function in net/mac80211/agg-tx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Division by zero

EUVDB-ID: #VU98372

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47663

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the ad9834_write_frequency() function in drivers/staging/iio/frequency/ad9834.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper locking

EUVDB-ID: #VU98366

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47666

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the pm8001_phy_control() function in drivers/scsi/pm8001/pm8001_sas.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Memory leak

EUVDB-ID: #VU98856

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47728

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the BPF_CALL_5() function in net/core/filter.c, within the BPF_CALL_4() function in kernel/bpf/syscall.c, within the BPF_CALL_4() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU98933

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49914

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU98875

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49945

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ncsi_unregister_dev() function in net/ncsi/ncsi-manage.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Resource management error

EUVDB-ID: #VU99150

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49963

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU98879

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49982

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ata_rw_frameinit(), aoecmd_ata_rw(), resend(), probe() and aoecmd_ata_id() functions in drivers/block/aoe/aoecmd.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU99824

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50099

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the arm_probe_decode_insn() and arm_kprobe_decode_insn() functions in arch/arm64/kernel/probes/decode-insn.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds read

EUVDB-ID: #VU99810

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50115

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the nested_svm_get_tdp_pdptr() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Improper locking

EUVDB-ID: #VU99827

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50138

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bpf_ringbuf_alloc() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Resource management error

EUVDB-ID: #VU100143

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50184

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the virtio_pmem_flush() function in drivers/nvdimm/nd_virtio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Resource management error

EUVDB-ID: #VU100150

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50195

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pc_clock_settime() function in kernel/time/posix-clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU100123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50198

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the in_illuminance_period_available_show() function in drivers/iio/light/veml6030.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use of uninitialized resource

EUVDB-ID: #VU100194

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50237

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ieee80211_get_tx_power() function in net/mac80211/cfg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Input validation error

EUVDB-ID: #VU100207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50242

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ntfs_file_release() function in fs/ntfs3/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU100185

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50245

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ntfs_lookup() function in fs/ntfs3/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Buffer overflow

EUVDB-ID: #VU100203

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50246

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the mi_enum_attr() function in fs/ntfs3/record.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Out-of-bounds read

EUVDB-ID: #VU100172

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50247

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the decompress_chunk() function in fs/ntfs3/lznt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use-after-free

EUVDB-ID: #VU91599

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6270

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the aoecmd_cfg_pkts() function in the ATA over Ethernet (AoE) driver. A local user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-perf-debuginfo: before 5.10.0-136.102.0.183

python3-perf: before 5.10.0-136.102.0.183

perf-debuginfo: before 5.10.0-136.102.0.183

perf: before 5.10.0-136.102.0.183

kernel-tools-devel: before 5.10.0-136.102.0.183

kernel-tools-debuginfo: before 5.10.0-136.102.0.183

kernel-tools: before 5.10.0-136.102.0.183

kernel-source: before 5.10.0-136.102.0.183

kernel-headers: before 5.10.0-136.102.0.183

kernel-devel: before 5.10.0-136.102.0.183

kernel-debugsource: before 5.10.0-136.102.0.183

kernel-debuginfo: before 5.10.0-136.102.0.183

kernel: before 5.10.0-136.102.0.183

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###