openEuler 20.03 LTS SP4 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2024-50148
CVE-2024-50230
CVE-2024-50236
CVE-2024-50262
CVE-2024-50265
CVE-2024-50299
CVE-2024-53052
CVE-2024-53060
CVE-2024-53101
CWE-ID CWE-399
CWE-20
CWE-401
CWE-125
CWE-667
CWE-476
CWE-908
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Resource management error

EUVDB-ID: #VU100087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50148

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bnep_init() function in net/bluetooth/bnep/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU100188

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50230

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nilfs_clear_dirty_page() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU100162

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50236

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the wmi_process_mgmt_tx_comp() and ath10k_wmi_mgmt_tx_clean_up_pending() functions in drivers/net/wireless/ath/ath10k/wmi.c, within the ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() function in drivers/net/wireless/ath/ath10k/wmi-tlv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU100173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50262

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU100610

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50265

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ocfs2_xa_remove() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU100631

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50299

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper locking

EUVDB-ID: #VU100720

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53052

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the io_write_prep() and io_write() functions in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU100713

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53060

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amdgpu_atif_call() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use of uninitialized resource

EUVDB-ID: #VU100940

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53101

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP4

python3-perf-debuginfo: before 4.19.90-2412.1.0.0306

python3-perf: before 4.19.90-2412.1.0.0306

python2-perf-debuginfo: before 4.19.90-2412.1.0.0306

python2-perf: before 4.19.90-2412.1.0.0306

perf-debuginfo: before 4.19.90-2412.1.0.0306

perf: before 4.19.90-2412.1.0.0306

kernel-tools-devel: before 4.19.90-2412.1.0.0306

kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306

kernel-tools: before 4.19.90-2412.1.0.0306

kernel-source: before 4.19.90-2412.1.0.0306

kernel-devel: before 4.19.90-2412.1.0.0306

kernel-debugsource: before 4.19.90-2412.1.0.0306

kernel-debuginfo: before 4.19.90-2412.1.0.0306

bpftool-debuginfo: before 4.19.90-2412.1.0.0306

bpftool: before 4.19.90-2412.1.0.0306

kernel: before 4.19.90-2412.1.0.0306

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###