Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU92194
Risk: Low
CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-48627
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93004
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-48629
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82755
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-47233
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the brcm80211 in a brcmf_cfg80211_detach in the device unplugging (disconnect the USB by hotplug) code. An attacker with physical access to device can trigger a use-after-free error and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90801
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52486
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the drivers/gpu/drm/drm_plane.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90347
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52504
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the apply_alternatives() function in arch/x86/kernel/alternative.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91319
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52524
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nfc_llcp_register_device() function in net/nfc/llcp_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89390
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52574
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in drivers/net/team/team.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90841
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52607
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pgtable_cache_add() function in arch/powerpc/mm/init-common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85422
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-7042
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() function in drivers/net/wireless/ath/ath10k/wmi-tlv.c. A local user can pass specially crafted data to the driver and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91634
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-24861
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the xc4000 xc4000_get_frequency() function in the media/xc4000 device driver. A local user can exploit the race and escalate privileges on the system.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92399
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-25739
CWE-ID:
CWE-754 - Improper Check for Unusual or Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper check for unusual or exceptional conditions error within the ubi_read_volume_table() function in drivers/mtd/ubi/vtbl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90627
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26615
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __smc_diag_dump() function in net/smc/smc_diag.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88148
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26654
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in sound/sh/aica.c. A local user can exploit the race and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92073
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26663
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tipc_nl_bearer_add() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90795
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26696
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_page_mkwrite() function in fs/nilfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
perf: before 4.19.90-2404.3.0.0247
python2-perf-debuginfo: before 4.19.90-2404.3.0.0247
bpftool-debuginfo: before 4.19.90-2404.3.0.0247
perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-devel: before 4.19.90-2404.3.0.0247
python3-perf: before 4.19.90-2404.3.0.0247
python3-perf-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-debuginfo: before 4.19.90-2404.3.0.0247
kernel-source: before 4.19.90-2404.3.0.0247
kernel-debuginfo: before 4.19.90-2404.3.0.0247
kernel-tools-devel: before 4.19.90-2404.3.0.0247
bpftool: before 4.19.90-2404.3.0.0247
python2-perf: before 4.19.90-2404.3.0.0247
kernel-tools: before 4.19.90-2404.3.0.0247
kernel-debugsource: before 4.19.90-2404.3.0.0247
kernel: before 4.19.90-2404.3.0.0247
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1496
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.