Risk | Low |
Patch available | YES |
Number of vulnerabilities | 121 |
CVE-ID | CVE-2024-42122 CVE-2024-44943 CVE-2024-44951 CVE-2024-45021 CVE-2024-46685 CVE-2024-46702 CVE-2024-46735 CVE-2024-46743 CVE-2024-46809 CVE-2024-46815 CVE-2024-46824 CVE-2024-46831 CVE-2024-47679 CVE-2024-47686 CVE-2024-47688 CVE-2024-47690 CVE-2024-47691 CVE-2024-47696 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47719 CVE-2024-47727 CVE-2024-47739 CVE-2024-47742 CVE-2024-47744 CVE-2024-47748 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47756 CVE-2024-49850 CVE-2024-49852 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49862 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49877 CVE-2024-49879 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49886 CVE-2024-49889 CVE-2024-49892 CVE-2024-49896 CVE-2024-49898 CVE-2024-49901 CVE-2024-49909 CVE-2024-49912 CVE-2024-49913 CVE-2024-49917 CVE-2024-49922 CVE-2024-49924 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49936 CVE-2024-49937 CVE-2024-49940 CVE-2024-49954 CVE-2024-49955 CVE-2024-49958 CVE-2024-49960 CVE-2024-49961 CVE-2024-49966 CVE-2024-49967 CVE-2024-49968 CVE-2024-49973 CVE-2024-49975 CVE-2024-49978 CVE-2024-49981 CVE-2024-49983 CVE-2024-49989 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-50000 CVE-2024-50003 CVE-2024-50006 CVE-2024-50008 CVE-2024-50009 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50016 CVE-2024-50019 CVE-2024-50022 CVE-2024-50025 CVE-2024-50026 CVE-2024-50028 CVE-2024-50029 CVE-2024-50033 CVE-2024-50036 CVE-2024-50040 CVE-2024-50041 CVE-2024-50047 CVE-2024-50055 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50063 CVE-2024-50064 CVE-2024-50066 CVE-2024-50067 CVE-2024-50070 CVE-2024-50072 CVE-2024-50074 CVE-2024-50076 CVE-2024-50083 CVE-2024-50084 CVE-2024-50087 CVE-2024-50088 |
CWE-ID | CWE-476 CWE-399 CWE-667 CWE-665 CWE-125 CWE-388 CWE-20 CWE-416 CWE-369 CWE-682 CWE-401 CWE-119 CWE-193 CWE-415 CWE-190 CWE-908 CWE-362 CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 121 vulnerabilities.
EUVDB-ID: #VU94961
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42122
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c, within the dcn321_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c, within the dcn32_hpo_dp_link_encoder_create() and dml1_validate() functions in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn314_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn31_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c, within the dcn30_validate_bandwidth() function in drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c, within the dcn32_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c, within the dcn3_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96598
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44943
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hugetlb_follow_page_mask() function in mm/hugetlb.c, within the follow_devmap_pmd(), follow_devmap_pud() and follow_trans_huge_pmd() functions in mm/huge_memory.c, within the try_grab_folio(), gup_put_folio(), follow_page_pte(), get_gate_page(), undo_dev_pagemap(), gup_pte_range(), __gup_device_huge(), gup_hugepte(), gup_huge_pmd(), gup_huge_pud() and gup_huge_pgd() functions in mm/gup.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96856
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44951
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sc16is7xx_set_baud(), sc16is7xx_handle_rx() and sc16is7xx_handle_tx() functions in drivers/tty/serial/sc16is7xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45021
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the memcg_write_event_control() function in mm/memcontrol.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97259
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46685
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pcs_get_function() function in drivers/pinctrl/pinctrl-single.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97264
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46702
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tb_switch_remove() function in drivers/thunderbolt/switch.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97530
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46735
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ublk_ctrl_start_recovery() function in drivers/block/ublk_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97503
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46743
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the of_irq_parse_one() function in drivers/of/irq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97813
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46809
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the get_ss_info_v3_1(), get_ss_info_from_internal_ss_info_tbl_V2_1(), get_ss_info_from_ss_info_table(), get_ss_entry_number_from_ss_info_tbl(), get_ss_entry_number_from_internal_ss_info_tbl_v2_1() and get_ss_entry_number_from_internal_ss_info_tbl_V3_1() functions in drivers/gpu/drm/amd/display/dc/bios/bios_parser.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46815
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the build_watermark_ranges() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn21/rn_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97799
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46824
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the iommufd_hwpt_nested_alloc() function in drivers/iommu/iommufd/hw_pagetable.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97778
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46831
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vcap_api_encode_rule_test() function in drivers/net/ethernet/microchip/vcap/vcap_api_kunit.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47679
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the spin_lock() function in fs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98922
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47686
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ep93xx_div_recalc_rate() function in arch/arm/mach-ep93xx/clock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47688
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the module_add_driver() function in drivers/base/module.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99080
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47690
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the f2fs_get_parent() and f2fs_lookup() functions in fs/f2fs/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98900
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47691
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the f2fs_shutdown() function in fs/f2fs/super.c, within the f2fs_ioc_abort_atomic_write(), f2fs_do_shutdown() and f2fs_ioc_shutdown() functions in fs/f2fs/file.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98899
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47696
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iw_cm_init() function in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98985
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47699
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nilfs_btree_root_broken() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47700
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ext4_block_group_meta_init(), __ext4_fill_super() and __ext4_remount() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98898
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47701
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_find_inline_entry() function in fs/ext4/inline.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99189
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47703
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the mark_reg_unknown(), check_packet_access(), check_ctx_access(), check_stack_access_within_bounds(), check_mem_access() and check_return_code() functions in kernel/bpf/verifier.c, within the btf_ctx_access() function in kernel/bpf/btf.c, within the BTF_SET_START() function in kernel/bpf/bpf_lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47704
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the set_hpo_dp_throttled_vcp_size() and disable_hpo_dp_link_output() functions in drivers/gpu/drm/amd/display/dc/link/hwss/link_hwss_hpo_dp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47705
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the blk_add_partition() function in block/partitions/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98863
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47719
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iopt_alloc_iova() function in drivers/iommu/iommufd/io_pagetable.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99231
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47727
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the handle_mmio() function in arch/x86/coco/tdx/tdx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47739
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the padata_do_serial() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47742
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the fw_abort_batch_reqs() and _request_firmware() functions in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47744
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the EXPORT_SYMBOL_GPL(), kvm_online_cpu(), hardware_disable_nolock(), hardware_disable_all_nolock(), hardware_enable_all() and kvm_suspend() functions in virt/kvm/kvm_main.c, within the cpus_read_lock() function in Documentation/virt/kvm/locking.rst. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98889
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47748
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vhost_vdpa_setup_vq_irq(), vhost_vdpa_vring_ioctl() and vhost_vdpa_open() functions in drivers/vhost/vdpa.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98914
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47751
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the kirin_pcie_parse_port() function in drivers/pci/controller/dwc/pcie-kirin.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99045
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47752
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vdec_h264_slice_decode() function in drivers/media/platform/mediatek/vcodec/decoder/vdec/vdec_h264_req_if.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99046
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47753
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vdec_vp8_slice_decode() function in drivers/media/platform/mediatek/vcodec/decoder/vdec/vdec_vp8_req_if.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47756
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ks_pcie_quirk() function in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98974
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49850
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bpf_core_apply() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98891
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49852
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efc_nport_vport_del() function in drivers/scsi/elx/libefc/efc_nport.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49858
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the efi_retrieve_tpm2_eventlog() function in drivers/firmware/efi/libstub/tpm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99230
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49859
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the f2fs_defragment_range(), f2fs_move_file_range() and f2fs_ioc_set_pin_file() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49860
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the acpi_device_setup_files() function in drivers/acpi/device_sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49862
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the get_rpi() function in drivers/powercap/intel_rapl_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98851
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49870
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cachefiles_open_file(), fput() and cachefiles_look_up_object() functions in fs/cachefiles/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98968
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49871
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the adp5589_keypad_add() and adp5589_probe() functions in drivers/input/keyboard/adp5589-keys.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98884
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49874
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the svc_i3c_master_remove() function in drivers/i3c/master/svc-i3c-master.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98966
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49877
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98965
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49879
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the omapdrm_init() and omap_gem_deinit() functions in drivers/gpu/drm/omapdrm/omap_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98852
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49881
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the get_ext_path() function in fs/ext4/move_extent.c, within the ext4_find_extent() and ext4_split_extent_at() functions in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99076
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49882
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ext4_ext_try_to_merge_up() function in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98866
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49883
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98867
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98903
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49886
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the _isst_if_get_pci_dev() function in drivers/platform/x86/intel/speed_select_if/isst_if_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98868
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49889
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extents(), ext4_split_extent() and ext4_ext_handle_unwritten_extents() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49892
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn21/display_rq_dlg_calc_21.c, within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn20/display_rq_dlg_calc_20v2.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98962
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49896
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the are_stream_backends_same() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98961
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49898
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the subvp_drr_schedulable() and subvp_vblank_schedulable() functions in drivers/gpu/drm/amd/display/dc/dml/dcn32/dcn32_fpu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98960
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49901
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the msm_gpu_init() function in drivers/gpu/drm/msm/msm_gpu.c, within the adreno_gpu_init() function in drivers/gpu/drm/msm/adreno/adreno_gpu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49909
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/hwss/dcn32/dcn32_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98935
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49912
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the planes_changed_for_existing_stream() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98934
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49913
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the commit_planes_for_stream() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98930
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49917
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn30_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98924
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49922
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the create_validate_stream_for_sink(), amdgpu_dm_commit_streams() and amdgpu_dm_atomic_commit_tail() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98870
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49924
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pxafb_remove() function in drivers/video/fbdev/pxafb.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98907
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49931
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/wireless/ath/ath12k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98906
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49933
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ioc_forgive_debts() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98872
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dump_mapping() function in fs/inode.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98873
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49936
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xenvif_new_hash() and xenvif_flush_hash() functions in drivers/net/xen-netback/hash.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99071
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49937
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nl80211_start_radar_detection() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49940
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pppol2tp_session_setsockopt() function in net/l2tp/l2tp_ppp.c, within the l2tp_nl_cmd_session_modify() function in net/l2tp/l2tp_netlink.c, within the l2tp_v3_session_get(), l2tp_session_register(), l2tp_recv_common(), EXPORT_SYMBOL_GPL(), l2tp_session_set_header_len() and l2tp_session_create() functions in net/l2tp/l2tp_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99149
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49954
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the static_call_module_notify() function in kernel/static_call_inline.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49955
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the battery_hook_unregister_unlocked() and battery_hook_register() functions in drivers/acpi/battery.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99044
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49958
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_reflink_xattr_inline() function in fs/ocfs2/xattr.c, within the __ocfs2_reflink() function in fs/ocfs2/refcounttree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98877
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49960
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the flush_work() function in fs/ext4/super.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49961
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ar0521_power_off() and ar0521_power_on() functions in drivers/media/i2c/ar0521.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99070
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49966
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ocfs2_local_read_info() function in fs/ocfs2/quota_local.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99223
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49967
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the do_split() function in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49968
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ext4_feature_set_ok() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49973
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98854
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49975
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __create_xol_area() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98948
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49978
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __udp_gso_segment() function in net/ipv4/udp_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98878
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49981
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the venus_remove() function in drivers/media/platform/qcom/venus/core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98880
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49983
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_ext_replay_update_ex() function in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99058
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49989
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the link_destruct() function in drivers/gpu/drm/amd/display/dc/link/link_factory.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98883
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49992
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ltdc_crtc_atomic_print_state(), ltdc_plane_atomic_print_state(), ltdc_plane_create(), ltdc_crtc_init(), ltdc_encoder_init(), ltdc_load() and ltdc_unload() functions in drivers/gpu/drm/stm/ltdc.c, within the drv_load() function in drivers/gpu/drm/stm/drv.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99092
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49994
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the blk_ioctl_discard() and blk_ioctl_secure_erase() functions in block/ioctl.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49995
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bearer_name_validate() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99101
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49996
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the parse_reparse_posix() and cifs_reparse_point_to_fattr() functions in fs/smb/client/reparse.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98943
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50000
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5e_tir_builder_alloc() function in drivers/net/ethernet/mellanox/mlx5/core/en/tir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99218
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50003
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dmub_hpd_callback() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50006
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_ind_migrate() function in fs/ext4/migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99167
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50008
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mwifiex_ret_802_11_scan_ext() function in drivers/net/wireless/marvell/mwifiex/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98923
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50009
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amd_pstate_adjust_perf() and amd_pstate_init_prefcore() functions in drivers/cpufreq/amd-pstate.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98850
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50013
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the exfat_load_bitmap() function in fs/exfat/balloc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99010
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50014
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __ext4_fill_super() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99099
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50015
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ext4_handle_inode_extension(), ext4_dio_write_iter() and ext4_dax_write_iter() functions in fs/ext4/file.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99090
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50016
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50019
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the kthread_unpark() function in kernel/kthread.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50022
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dax_set_mapping() function in drivers/dax/device.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99001
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50025
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fnic_probe() function in drivers/scsi/fnic/fnic_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50026
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the wd33c93_intr() function in drivers/scsi/wd33c93.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50028
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the thermal_genl_cmd_tz_get_trip(), thermal_genl_cmd_tz_get_temp() and thermal_genl_cmd_tz_get_gov() functions in drivers/thermal/thermal_netlink.c, within the thermal_zone_get_by_id() function in drivers/thermal/thermal_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99056
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50029
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the hci_enhanced_setup_sync() function in net/bluetooth/hci_conn.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50033
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the slhc_remember() function in drivers/net/slip/slhc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99185
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50036
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the dst_destroy() and dst_dev_put() functions in net/core/dst.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50040
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the igb_io_resume() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98999
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50041
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the i40e_vc_get_vf_resources_msg() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c, within the i40e_add_mac_filter() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50047
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the smb2_get_enc_key(), crypt_message(), smb3_init_transform_rq() and decrypt_raw_data() functions in fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99057
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50055
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the bus_remove_file() function in drivers/base/bus.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50058
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the uart_shutdown() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99125
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50059
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the switchtec_ntb_remove() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98994
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50060
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __io_cqring_overflow_flush() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99190
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50063
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bpf_prog_map_compatible() function in kernel/bpf/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99117
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50064
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the zram_destroy_comps() function in drivers/block/zram/zram_drv.c. A local user can gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99290
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50066
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the move_normal_pmd() function in mm/mremap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99434
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50067
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uprobe_buffer_init(), prepare_uprobe_buffer() and __uprobe_trace_func() functions in kernel/trace/trace_uprobe.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99447
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50070
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the stm32_gpiolib_register_bank() function in drivers/pinctrl/stm32/pinctrl-stm32.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99457
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50072
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the arch/x86/include/asm/nospec-branch.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99445
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50074
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99460
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50076
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the con_font_get() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99458
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50083
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tcp_can_coalesce_send_queue_head() function in net/ipv4/tcp_output.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99441
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50084
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vcap_api_encode_rule_test() function in drivers/net/ethernet/microchip/vcap/vcap_api_kunit.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99455
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50087
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the replay_one_name() and check_item_in_log() functions in fs/btrfs/tree-log.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99448
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50088
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the add_inode_ref() function in fs/btrfs/tree-log.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-50.0.0.55
python3-perf: before 6.6.0-50.0.0.55
perf-debuginfo: before 6.6.0-50.0.0.55
perf: before 6.6.0-50.0.0.55
kernel-tools-devel: before 6.6.0-50.0.0.55
kernel-tools-debuginfo: before 6.6.0-50.0.0.55
kernel-tools: before 6.6.0-50.0.0.55
kernel-source: before 6.6.0-50.0.0.55
kernel-headers: before 6.6.0-50.0.0.55
kernel-devel: before 6.6.0-50.0.0.55
kernel-debugsource: before 6.6.0-50.0.0.55
kernel-debuginfo: before 6.6.0-50.0.0.55
bpftool-debuginfo: before 6.6.0-50.0.0.55
bpftool: before 6.6.0-50.0.0.55
kernel: before 6.6.0-50.0.0.55
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.