Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 96 |
CVE-ID | CVE-2023-52889 CVE-2024-27397 CVE-2024-36012 CVE-2024-36015 CVE-2024-36032 CVE-2024-36244 CVE-2024-36880 CVE-2024-36889 CVE-2024-36894 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36913 CVE-2024-36915 CVE-2024-36918 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36927 CVE-2024-36936 CVE-2024-36940 CVE-2024-36941 CVE-2024-36946 CVE-2024-36963 CVE-2024-36971 CVE-2024-38594 CVE-2024-38608 CVE-2024-38612 CVE-2024-40999 CVE-2024-42104 CVE-2024-42128 CVE-2024-42157 CVE-2024-42229 CVE-2024-42232 CVE-2024-42236 CVE-2024-42280 CVE-2024-42283 CVE-2024-42286 CVE-2024-42287 CVE-2024-42289 CVE-2024-42290 CVE-2024-42292 CVE-2024-42295 CVE-2024-42299 CVE-2024-42305 CVE-2024-42306 CVE-2024-42308 CVE-2024-42309 CVE-2024-42311 CVE-2024-42313 CVE-2024-42322 CVE-2024-43823 CVE-2024-43828 CVE-2024-43830 CVE-2024-43831 CVE-2024-43834 CVE-2024-43840 CVE-2024-43860 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-44931 CVE-2024-44952 CVE-2024-44990 CVE-2024-45018 CVE-2024-46676 CVE-2024-46689 CVE-2024-46691 CVE-2024-46709 CVE-2024-46716 CVE-2024-46726 CVE-2024-46754 CVE-2024-46795 CVE-2024-46805 CVE-2024-46810 CVE-2024-46817 CVE-2024-46819 CVE-2024-46821 CVE-2024-46822 CVE-2024-46826 CVE-2024-46830 CVE-2024-46836 CVE-2024-46838 CVE-2024-46840 CVE-2024-46854 CVE-2024-46855 CVE-2024-46858 CVE-2024-46859 CVE-2024-47658 CVE-2024-47665 CVE-2024-47669 CVE-2024-47671 CVE-2024-47672 CVE-2024-47675 CVE-2024-47731 CVE-2024-47741 |
CWE-ID | CWE-476 CWE-667 CWE-416 CWE-252 CWE-20 CWE-399 CWE-908 CWE-200 CWE-125 CWE-119 CWE-415 CWE-269 CWE-401 CWE-388 CWE-362 CWE-369 CWE-835 |
Exploitation vector | Local |
Public exploit | Vulnerability #25 is being exploited in the wild. |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 96 vulnerabilities.
EUVDB-ID: #VU96132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52889
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the apparmor_socket_sock_rcv_skb() function in security/apparmor/lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27397
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90058
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36012
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the msft_monitor_supported() function in net/bluetooth/msft.h, within the msft_register() function in net/bluetooth/msft.c, within the hci_unregister_dev() and hci_release_dev() functions in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89896
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36015
CWE-ID:
CWE-252 - Unchecked Return Value
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an unchecked return value within the register_device() function in drivers/char/ppdev.c. A local user can perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90849
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36032
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qca_read_fw_build_info() function in drivers/bluetooth/btqca.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93252
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36244
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the parse_taprio_schedule() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90850
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36880
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qca_send_pre_shutdown_cmd(), qca_tlv_check_data() and qca_download_firmware() functions in drivers/bluetooth/btqca.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90975
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36889
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90735
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36894
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ffs_user_copy_worker() and ffs_epfile_async_io_complete() functions in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93085
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36909
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vmbus_free_ring() function in drivers/hv/channel.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93345
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36910
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hv_uio_cleanup() and hv_uio_probe() functions in drivers/uio/uio_hv_generic.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93346
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36911
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the free_netvsc_device() function in drivers/net/hyperv/netvsc.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91323
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36913
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the vmbus_connect() and vmbus_disconnect() functions in drivers/hv/connection.c. A local user can gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90268
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36915
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nfc_llcp_setsockopt() function in net/nfc/llcp_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93447
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36918
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the test_fail_cases() function in tools/testing/selftests/bpf/prog_tests/bloom_filter_map.c, within the bloom_map_get_next_key() and bloom_map_check_btf() functions in kernel/bpf/bloom_filter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93238
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36920
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mpi3mr_bsg_process_mpt_cmds() function in drivers/scsi/mpi3mr/mpi3mr_app.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90270
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36921
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_mld_rm_sta() function in drivers/net/wireless/intel/iwlwifi/mvm/mld-sta.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92009
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36922
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iwl_txq_reclaim() function in drivers/net/wireless/intel/iwlwifi/queue/tx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90863
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36927
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the raw_sendmsg() function in net/ipv4/raw.c, within the __ip_make_skb() function in net/ipv4/ip_output.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91441
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36936
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the list_del() function in drivers/firmware/efi/unaccepted_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90885
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36940
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the pinctrl_enable() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90528
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36941
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nl80211_set_coalesce() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93469
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36946
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the rtm_phonet_notify() function in net/phonet/pn_netlink.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93733
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36963
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
The vulnerability exists due to improperly imposed permissions within the DEFINE_SPINLOCK(), tracefs_apply_options() and tracefs_d_revalidate() functions in fs/tracefs/inode.c, within the eventfs_remount() function in fs/tracefs/event_inode.c. A local user can read and manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91597
Risk: Critical
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]
CVE-ID: CVE-2024-36971
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a use-after-free error within the xfrm_link_failure() function in net/xfrm/xfrm_policy.c, within the dst_entry ip6_dst_check() and ip6_dst_check() functions in net/ipv6/route.c, within the dst_entry ipv4_dst_check() and ip_do_redirect() functions in net/ipv4/route.c. A remote attacker can send specially crafted packets to the system and execute arbitrary code.
Note, the vulnerability is being actively exploited in the wild.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU92363
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38594
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tc_taprio_configure() function in drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c, within the stmmac_adjust_time() function in drivers/net/ethernet/stmicro/stmmac/stmmac_ptp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92341
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38608
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5e_resume(), _mlx5e_suspend(), mlx5e_suspend(), _mlx5e_probe() and _mlx5e_remove() functions in drivers/net/ethernet/mellanox/mlx5/core/en_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92314
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38612
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the IS_ENABLED() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40999
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ena_com_cdesc_rx_pkt_get() and ena_com_rx_pkt() functions in drivers/net/ethernet/amazon/ena/ena_eth_com.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94937
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42104
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_check_page() and nilfs_error() functions in fs/nilfs2/dir.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95058
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42128
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the an30259a_probe() function in drivers/leds/leds-an30259a.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95090
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42157
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42229
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the setkey_unaligned() function in crypto/cipher.c, within the setkey_unaligned() function in crypto/aead.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95503
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42232
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the delayed_work() and EXPORT_SYMBOL() functions in net/ceph/mon_client.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95502
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42236
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usb_string_copy() function in drivers/usb/gadget/configfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96106
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfcmulti_dtmf() and HFC_wait_nodebug() functions in drivers/isdn/hardware/mISDN/hfcmulti.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42283
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nla_put_nh_group() function in net/ipv4/nexthop.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42286
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla_nvme_register_remote() function in drivers/scsi/qla2xxx/qla_nvme.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96140
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42287
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42289
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla24xx_disable_vp() function in drivers/scsi/qla2xxx/qla_mid.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96181
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42290
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the imx_irqsteer_get_reg_index(), imx_irqsteer_irq_mask() and imx_irqsteer_probe() functions in drivers/irqchip/irq-imx-irqsteer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42292
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the zap_modalias_env() function in lib/kobject_uevent.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96166
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42295
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nilfs_btree_get_new_block() function in fs/nilfs2/btree.c, within the nilfs_btnode_create_block() function in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the blksize_bits() function in fs/ntfs3/fslog.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42305
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the add_dirent_to_buf() and make_indexed_dir() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42306
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the udf_sb_free_bitmap() function in fs/udf/super.c, within the read_block_bitmap() and __load_block_bitmap() functions in fs/udf/balloc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96136
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42308
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dc_plane_get_status() function in drivers/gpu/drm/amd/display/dc/core/dc_surface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42309
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psb_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/psb_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42311
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfs_new_inode() and hfs_inode_read_fork() functions in fs/hfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96109
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42313
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vdec_close() function in drivers/media/platform/qcom/venus/vdec.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96189
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42322
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ip_vs_add_service() function in net/netfilter/ipvs/ip_vs_ctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43823
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ks_pcie_setup_rc_app_regs() and ks_pcie_host_init() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96169
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43828
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ext4_es_find_extent_range() function in fs/ext4/extents_status.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43830
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the led_trigger_set() function in drivers/leds/led-triggers.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96196
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43831
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vpu_dec_init() function in drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96103
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43834
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xdp_unreg_mem_model() function in net/core/xdp.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96178
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43840
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the prepare_trampoline() function in arch/arm64/net/bpf_jit_comp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43860
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96546
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43892
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the MEM_CGROUP_ID_MAX(), mem_cgroup_alloc() and mem_cgroup_css_online() functions in mm/memcontrol.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96540
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43893
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the uart_set_info() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96536
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43894
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44931
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gpiochip_get_desc() function in drivers/gpio/gpiolib.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96857
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44952
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the make_driver_name() and module_remove_driver() functions in drivers/base/module.c, within the dev_uevent() and uevent_show() functions in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96848
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44990
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bond_ipsec_offload_ok() function in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45018
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_flow_offload_tuple() function in net/netfilter/nf_flow_table_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46676
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the pn533_start_poll() function in drivers/nfc/pn533/pn533.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46689
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the cmd_db_dev_probe() function in drivers/soc/qcom/cmd-db.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46691
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pmic_glink_ucsi_notify(), pmic_glink_ucsi_callback() and pmic_glink_ucsi_probe() functions in drivers/usb/typec/ucsi/ucsi_glink.c, within the EXPORT_SYMBOL_GPL() function in drivers/soc/qcom/pmic_glink.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97285
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46709
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the vmw_stdu_bo_cpu_commit() and vmw_stdu_bo_populate_update_cpu() functions in drivers/gpu/drm/vmwgfx/vmwgfx_stdu.c, within the vmw_bo_cpu_blit_line() and vmw_bo_cpu_blit() functions in drivers/gpu/drm/vmwgfx/vmwgfx_blit.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97572
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46716
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the msgdma_free_descriptor() and msgdma_chan_desc_cleanup() functions in drivers/dma/altera-msgdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97557
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46726
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dcn_bw_update_from_pplib_fclks() function in drivers/gpu/drm/amd/display/dc/dml/calcs/dcn_calcs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97566
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46754
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97516
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46795
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smb2_sess_setup() function in fs/ksmbd/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97793
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46805
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psp_xgmi_reflect_topology_info() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97796
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46810
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tc_irq_handler() function in drivers/gpu/drm/bridge/tc358767.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97830
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46817
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_dm_initialize_drm_device() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97797
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46819
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nbio_v7_4_handle_ras_controller_intr_no_bifring() function in drivers/gpu/drm/amd/amdgpu/nbio_v7_4.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46821
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the navi10_get_current_clk_freq_by_table(), navi10_emit_clk_levels(), navi10_print_clk_levels() and navi10_force_clk_levels() functions in drivers/gpu/drm/amd/pm/swsmu/smu11/navi10_ppt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97798
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46822
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the arch/arm64/include/asm/acpi.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46826
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/binfmt_elf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97804
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46830
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the kvm_arch_vcpu_ioctl() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97837
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46836
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ast_udc_getstatus() function in drivers/usb/gadget/udc/aspeed_udc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97806
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46838
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mm/userfaultfd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97808
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46840
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the reada_walk_down(), walk_down_proc(), do_walk_down() and walk_up_proc() functions in fs/btrfs/extent-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97776
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dpaa_start_xmit() function in drivers/net/ethernet/freescale/dpaa/dpaa_eth.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97777
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46855
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_socket_eval() function in net/netfilter/nft_socket.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97783
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46858
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mptcp_pm_del_add_timer() and remove_anno_list_by_saddr() functions in net/mptcp/pm_netlink.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97791
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46859
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEVICE_ATTR_RW(), acpi_pcc_hotkey_resume() and acpi_pcc_hotkey_add() functions in drivers/platform/x86/panasonic-laptop.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98369
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47658
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the stm32_cryp_irq_thread() function in drivers/crypto/stm32/stm32-cryp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98379
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47665
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_dma_init() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98367
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47669
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_segctor_abort_construction() and nilfs_segctor_do_construct() functions in fs/nilfs2/segment.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98377
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47671
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usbtmc_create_urb() function in drivers/usb/class/usbtmc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98368
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47672
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iwl_mvm_flush_no_vif() and iwl_mvm_mac_flush() functions in drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98861
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47675
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bpf_uprobe_multi_link_attach() function in kernel/trace/bpf_trace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47731
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ali_drw_pmu_isr() function in drivers/perf/alibaba_uncore_drw_pmu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98858
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47741
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the find_desired_extent_in_hole() and find_desired_extent() functions in fs/btrfs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-47.0.0.52
python3-perf: before 6.6.0-47.0.0.52
perf-debuginfo: before 6.6.0-47.0.0.52
perf: before 6.6.0-47.0.0.52
kernel-tools-devel: before 6.6.0-47.0.0.52
kernel-tools-debuginfo: before 6.6.0-47.0.0.52
kernel-tools: before 6.6.0-47.0.0.52
kernel-source: before 6.6.0-47.0.0.52
kernel-headers: before 6.6.0-47.0.0.52
kernel-devel: before 6.6.0-47.0.0.52
kernel-debugsource: before 6.6.0-47.0.0.52
kernel-debuginfo: before 6.6.0-47.0.0.52
bpftool-debuginfo: before 6.6.0-47.0.0.52
bpftool: before 6.6.0-47.0.0.52
kernel: before 6.6.0-47.0.0.52
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2296
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.