Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 29 |
CVE-ID | CVE-2021-47484 CVE-2023-52881 CVE-2024-27030 CVE-2024-27074 CVE-2024-27403 CVE-2024-35789 CVE-2024-35829 CVE-2024-35871 CVE-2024-36004 CVE-2024-36007 CVE-2024-36244 CVE-2024-38608 CVE-2024-38612 CVE-2024-39495 CVE-2024-40958 CVE-2024-42289 CVE-2024-42321 CVE-2024-43880 CVE-2024-44931 CVE-2024-44952 CVE-2024-44989 CVE-2024-44990 CVE-2024-45018 CVE-2024-46716 CVE-2024-46817 CVE-2024-46822 CVE-2024-46826 CVE-2024-46859 CVE-2024-47661 |
CWE-ID | CWE-476 CWE-451 CWE-362 CWE-401 CWE-191 CWE-416 CWE-399 CWE-682 CWE-667 CWE-908 CWE-20 CWE-125 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 29 vulnerabilities.
EUVDB-ID: #VU90403
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47484
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nix_free_tx_vtag_entries() function in drivers/net/ethernet/marvell/octeontx2/af/rvu_nix.c, within the rvu_dbg_qsize_write() function in drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89895
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52881
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to an error within the tcp_ack() function in net/ipv4/tcp_input.c, which can result in system accepting ACK responses for bytes that were never sent. A remote attacker can perform spoofing attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91473
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27030
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the rvu_queue_work(), rvu_mbox_intr_handler() and rvu_register_interrupts() functions in drivers/net/ethernet/marvell/octeontx2/af/rvu.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27074
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the go7007_load_encoder() function in drivers/media/usb/go7007/go7007-driver.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91669
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27403
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the flow_offload_dst_cookie() and nft_flow_dst_release() functions in net/netfilter/nf_flow_table_core.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90167
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35789
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ieee80211_change_station() function in net/mac80211/cfg.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90446
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35829
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the lima_heap_alloc() function in drivers/gpu/drm/lima/lima_gem.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91639
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __asm__() and copy_thread() functions in arch/riscv/kernel/process.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93281
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36004
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the i40e_init_module() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93612
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36007
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the mlxsw_sp_acl_tcam_vregion_rehash_work(), mlxsw_sp_acl_tcam_rehash_ctx_vregion_changed(), mlxsw_sp_acl_tcam_vchunk_migrate_end(), mlxsw_sp_acl_tcam_vchunk_migrate_one(), mlxsw_sp_acl_tcam_vregion_migrate() and mlxsw_sp_acl_tcam_vregion_rehash_start() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93252
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36244
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the parse_taprio_schedule() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92341
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38608
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5e_resume(), _mlx5e_suspend(), mlx5e_suspend(), _mlx5e_probe() and _mlx5e_remove() functions in drivers/net/ethernet/mellanox/mlx5/core/en_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92314
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38612
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the IS_ENABLED() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94232
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39495
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gb_interface_release() function in drivers/greybus/interface.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94215
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40958
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42289
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla24xx_disable_vp() function in drivers/scsi/qla2xxx/qla_mid.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96183
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42321
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __skb_flow_dissect() function in net/core/flow_dissector.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96305
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43880
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_hints_obj_cmp() and objagg_hints_get() functions in lib/objagg.c, within the mlxsw_sp_acl_erp_delta_check() and mlxsw_sp_acl_erp_root_destroy() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44931
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gpiochip_get_desc() function in drivers/gpio/gpiolib.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96857
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44952
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the make_driver_name() and module_remove_driver() functions in drivers/base/module.c, within the dev_uevent() and uevent_show() functions in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96847
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44989
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bond_ipsec_del_sa_all() function in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96848
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44990
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bond_ipsec_offload_ok() function in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45018
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_flow_offload_tuple() function in net/netfilter/nf_flow_table_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97572
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46716
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the msgdma_free_descriptor() and msgdma_chan_desc_cleanup() functions in drivers/dma/altera-msgdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97830
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46817
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_dm_initialize_drm_device() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97798
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46822
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the arch/arm64/include/asm/acpi.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46826
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/binfmt_elf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97791
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46859
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEVICE_ATTR_RW(), acpi_pcc_hotkey_resume() and acpi_pcc_hotkey_add() functions in drivers/platform/x86/panasonic-laptop.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98371
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47661
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dmub_abm_set_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn21/dcn21_hwseq.c, within the dmub_abm_set_pipe() function in drivers/gpu/drm/amd/display/dc/dce/dmub_abm_lcd.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.98.0.179
python3-perf: before 5.10.0-136.98.0.179
perf-debuginfo: before 5.10.0-136.98.0.179
perf: before 5.10.0-136.98.0.179
kernel-tools-devel: before 5.10.0-136.98.0.179
kernel-tools-debuginfo: before 5.10.0-136.98.0.179
kernel-tools: before 5.10.0-136.98.0.179
kernel-source: before 5.10.0-136.98.0.179
kernel-headers: before 5.10.0-136.98.0.179
kernel-devel: before 5.10.0-136.98.0.179
kernel-debugsource: before 5.10.0-136.98.0.179
kernel-debuginfo: before 5.10.0-136.98.0.179
kernel: before 5.10.0-136.98.0.179
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2295
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.