Risk | Low |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2021-47014 CVE-2021-47036 CVE-2023-52445 CVE-2023-52458 CVE-2023-52528 CVE-2023-52593 CVE-2023-52602 CVE-2023-52603 CVE-2023-52604 |
CWE-ID | CWE-399 CWE-119 CWE-416 CWE-476 CWE-908 CWE-125 CWE-129 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system kernel-devel Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component python3-perf-debuginfo Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU93211
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47014
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tcf_ct_handle_fragments(), tcf_ct_act() and skb_push_rcsum() functions in net/sched/act_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93164
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47036
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the udp_gro_receive() function in net/ipv4/udp_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87745
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52445
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in pvrusb2. A local user can execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90657
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52458
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the blkpg_do_ioctl() function in block/ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90884
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52528
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the __smsc75xx_read_reg() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90629
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52593
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the wfx_upload_ap_templates() and wfx_start_ap() functions in drivers/net/wireless/silabs/wfx/sta.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89254
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52602
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the dtSearch() function in fs/jfs/jfs_dtree.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88885
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52603
CWE-ID:
CWE-129 - Improper Validation of Array Index
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper validation of array index within the dtSplitRoot() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90342
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52604
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP2
kernel-devel: before 5.10.0-153.48.0.126
kernel-source: before 5.10.0-153.48.0.126
kernel-debugsource: before 5.10.0-153.48.0.126
kernel-debuginfo: before 5.10.0-153.48.0.126
python3-perf: before 5.10.0-153.48.0.126
kernel-tools-devel: before 5.10.0-153.48.0.126
python3-perf-debuginfo: before 5.10.0-153.48.0.126
kernel-headers: before 5.10.0-153.48.0.126
kernel-tools: before 5.10.0-153.48.0.126
kernel-tools-debuginfo: before 5.10.0-153.48.0.126
perf-debuginfo: before 5.10.0-153.48.0.126
perf: before 5.10.0-153.48.0.126
kernel: before 5.10.0-153.48.0.126
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1349
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.