Vulnerabilites related to OpenAnolis - Anolis OS
cve-2024-24856
Vulnerability from cvelistv5
Published
2024-04-17 08:34
Modified
2024-08-01 23:28
Summary
The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a successful allocation, but the subsequent code directly dereferences the pointer that receives it, which may lead to null pointer dereference. To fix this issue, a null pointer check should be added. If it is null, return exception code AE_NO_MEMORY.
Impacted products
Vendor Product Version
OpenAnolis Anolis OS Version: v4.4   < v6.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:openanolis:anolis_os:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "anolis_os",
                  vendor: "openanolis",
                  versions: [
                     {
                        lessThan: "v6.9",
                        status: "affected",
                        version: "v4.4",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-24856",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-05T15:41:12.748133Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-05T15:42:27.369Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T23:28:12.874Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.openanolis.cn/show_bug.cgi?id=8764",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               modules: [
                  "acpi",
               ],
               packageName: "kernel",
               platforms: [
                  "Linux",
               ],
               product: "Anolis OS",
               programFiles: [
                  "https://gitee.com/anolis/cloud-kernel/blob/devel-5.10/drivers/acpi/acpica/dbconvert.c",
               ],
               repo: "https://gitee.com/anolis/cloud-kernel.git",
               vendor: "OpenAnolis",
               versions: [
                  {
                     lessThan: "v6.9",
                     status: "affected",
                     version: "v4.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "白家驹 <baijiaju@buaa.edu.cn>",
            },
            {
               lang: "en",
               type: "reporter",
               value: "刘怀远 <qq810974084@gmail.com>",
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<pre>The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a\nsuccessful allocation, but the subsequent code directly dereferences the\npointer that receives it, which may lead to null pointer dereference.\n\nTo fix this issue, a null pointer check should be added. If it is null, \nreturn exception code AE_NO_MEMORY.</pre><br>",
                  },
               ],
               value: "The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a\nsuccessful allocation, but the subsequent code directly dereferences the\npointer that receives it, which may lead to null pointer dereference.\n\nTo fix this issue, a null pointer check should be added. If it is null, \nreturn exception code AE_NO_MEMORY.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-129",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-129 Pointer Manipulation",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476 NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-29T07:56:57.064Z",
            orgId: "cb8f1db9-b4b1-487b-a760-f65c4f368d8e",
            shortName: "Anolis",
         },
         references: [
            {
               url: "https://bugzilla.openanolis.cn/show_bug.cgi?id=8764",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/acpica/acpica/pull/946/commits/4d4547cf13cca820ff7e0f859ba83e1a610b9fd0\">https://github.com/acpica/acpica/pull/946/commits/4d4547cf13cca820ff7e0f859ba83e1a610b9fd0</a><br>",
                  },
               ],
               value: "https://github.com/acpica/acpica/pull/946/commits/4d4547cf13cca820ff7e0f859ba83e1a610b9fd0",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "NULL pointer deference in acpi_db_convert_to_package of Linux acpi module",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cb8f1db9-b4b1-487b-a760-f65c4f368d8e",
      assignerShortName: "Anolis",
      cveId: "CVE-2024-24856",
      datePublished: "2024-04-17T08:34:59.559Z",
      dateReserved: "2024-02-01T09:11:56.214Z",
      dateUpdated: "2024-08-01T23:28:12.874Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-1390
Vulnerability from cvelistv5
Published
2025-02-18 02:34
Modified
2025-02-18 19:28
Summary
The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
Impacted products
Vendor Product Version
OpenAnolis Anolis OS Version: 2.73;0   <
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-1390",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-18T15:08:39.991616Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-18T19:28:35.503Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "http://sites.google.com/site/fullycapable/",
               defaultStatus: "unaffected",
               modules: [
                  "pam_cap",
               ],
               packageName: "libcap",
               platforms: [
                  "Linux",
                  "x86",
                  "ARM",
               ],
               product: "Anolis OS",
               programFiles: [
                  "pam_cap/pam_cap.c",
               ],
               repo: "https://git.kernel.org/pub/scm/libs/libcap/libcap.git/",
               vendor: "OpenAnolis",
               versions: [
                  {
                     status: "affected",
                     version: "2.73;0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "Tianjia Zhang <tianjia.zhang@linux.alibaba.com>",
            },
         ],
         datePublic: "2025-02-17T07:03:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<div></div><span style=\"background-color: rgb(255, 255, 255);\">The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.</span><br>",
                  },
               ],
               value: "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-19",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-19 Embedding Scripts within Scripts",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-02-18T02:34:44.846Z",
            orgId: "cb8f1db9-b4b1-487b-a760-f65c4f368d8e",
            shortName: "Anolis",
         },
         references: [
            {
               url: "https://bugzilla.openanolis.cn/show_bug.cgi?id=18804",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<a target=\"_blank\" rel=\"nofollow\" href=\"https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a316d878\">https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a31...</a><br>",
                  },
               ],
               value: "https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a31... https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "pam_cap: Fix potential configuration parsing error",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cb8f1db9-b4b1-487b-a760-f65c4f368d8e",
      assignerShortName: "Anolis",
      cveId: "CVE-2025-1390",
      datePublished: "2025-02-18T02:34:44.846Z",
      dateReserved: "2025-02-17T06:36:53.706Z",
      dateUpdated: "2025-02-18T19:28:35.503Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}