Security Bulletin
This security bulletin contains information about 17 vulnerabilities.
EUVDB-ID: #VU90737
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47469
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the LIST_HEAD(), spi_add_device(), spi_add_device_locked(), spi_register_controller() and spi_unregister_controller() functions in drivers/spi/spi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92188
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39180
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak when handling SMB2_READ commands in ksmbd. A remote attacker can force the application to leak memory and perform denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91229
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52853
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cp2112_gpio_irq_startup() and cp2112_probe() functions in drivers/hid/hid-cp2112.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86812
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26592
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a race condition when handling TCP connect and disconnect events within the ksmbd_tcp_new_connection() function in
ksmbd. A remote non-authenticated attacker can trigger a use-after-free error and crash the kernel or execute arbitrary code on the system.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92034
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26925
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __nf_tables_abort() and nf_tables_abort() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92029
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-27053
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the wilc_parse_join_bss_param() function in drivers/staging/wilc1000/wilc_hif.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93591
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-35830
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91234
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-35902
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90145
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-35955
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the check_kprobe_address_safe() function in kernel/kprobes.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92055
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-36950
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91563
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-36969
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the setup_dsc_config() function in drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92332
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-36978
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the multiq_tune() function in net/sched/sch_multiq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92306
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38545
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the alloc_cqc(), free_cqc() and hns_roce_cq_event() functions in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92312
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38588
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lookup_rec(), ftrace_location_range(), ftrace_process_locs(), ftrace_release_mod() and ftrace_free_mem() functions in kernel/trace/ftrace.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92364
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38591
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the alloc_srqc() and free_srqc() functions in drivers/infiniband/hw/hns/hns_roce_srq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92380
Risk: Low
CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38596
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to manipulate data.
The vulnerability exists due to a data race within the unix_stream_sendmsg() function in net/unix/af_unix.c. A local user can manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93063
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38601
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the rb_check_list() and ring_buffer_resize() functions in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-debuginfo: before 5.10.0-215.0.0.119
perf-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-debuginfo: before 5.10.0-215.0.0.119
kernel-tools-devel: before 5.10.0-215.0.0.119
python3-perf: before 5.10.0-215.0.0.119
kernel-debugsource: before 5.10.0-215.0.0.119
python3-perf-debuginfo: before 5.10.0-215.0.0.119
kernel-devel: before 5.10.0-215.0.0.119
kernel-source: before 5.10.0-215.0.0.119
kernel-tools: before 5.10.0-215.0.0.119
kernel-headers: before 5.10.0-215.0.0.119
perf: before 5.10.0-215.0.0.119
kernel: before 5.10.0-215.0.0.119
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1765
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.