openEuler 24.03 LTS update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 121
CVE-ID CVE-2024-42122
CVE-2024-44943
CVE-2024-44951
CVE-2024-45021
CVE-2024-46685
CVE-2024-46702
CVE-2024-46735
CVE-2024-46743
CVE-2024-46809
CVE-2024-46815
CVE-2024-46824
CVE-2024-46831
CVE-2024-47679
CVE-2024-47686
CVE-2024-47688
CVE-2024-47690
CVE-2024-47691
CVE-2024-47696
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47719
CVE-2024-47727
CVE-2024-47739
CVE-2024-47742
CVE-2024-47744
CVE-2024-47748
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47756
CVE-2024-49850
CVE-2024-49852
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49862
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49877
CVE-2024-49879
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49886
CVE-2024-49889
CVE-2024-49892
CVE-2024-49896
CVE-2024-49898
CVE-2024-49901
CVE-2024-49909
CVE-2024-49912
CVE-2024-49913
CVE-2024-49917
CVE-2024-49922
CVE-2024-49924
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49936
CVE-2024-49937
CVE-2024-49940
CVE-2024-49954
CVE-2024-49955
CVE-2024-49958
CVE-2024-49960
CVE-2024-49961
CVE-2024-49966
CVE-2024-49967
CVE-2024-49968
CVE-2024-49973
CVE-2024-49975
CVE-2024-49978
CVE-2024-49981
CVE-2024-49983
CVE-2024-49989
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-50000
CVE-2024-50003
CVE-2024-50006
CVE-2024-50008
CVE-2024-50009
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50016
CVE-2024-50019
CVE-2024-50022
CVE-2024-50025
CVE-2024-50026
CVE-2024-50028
CVE-2024-50029
CVE-2024-50033
CVE-2024-50036
CVE-2024-50040
CVE-2024-50041
CVE-2024-50047
CVE-2024-50055
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50063
CVE-2024-50064
CVE-2024-50066
CVE-2024-50067
CVE-2024-50070
CVE-2024-50072
CVE-2024-50074
CVE-2024-50076
CVE-2024-50083
CVE-2024-50084
CVE-2024-50087
CVE-2024-50088
CWE-ID CWE-476
CWE-399
CWE-667
CWE-665
CWE-125
CWE-388
CWE-20
CWE-416
CWE-369
CWE-682
CWE-401
CWE-119
CWE-193
CWE-415
CWE-190
CWE-908
CWE-362
CWE-200
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 121 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU94961

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42122

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c, within the dcn321_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c, within the dcn32_hpo_dp_link_encoder_create() and dml1_validate() functions in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn314_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn31_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c, within the dcn30_validate_bandwidth() function in drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c, within the dcn32_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c, within the dcn3_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU96598

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44943

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the hugetlb_follow_page_mask() function in mm/hugetlb.c, within the follow_devmap_pmd(), follow_devmap_pud() and follow_trans_huge_pmd() functions in mm/huge_memory.c, within the try_grab_folio(), gup_put_folio(), follow_page_pte(), get_gate_page(), undo_dev_pagemap(), gup_pte_range(), __gup_device_huge(), gup_hugepte(), gup_huge_pmd(), gup_huge_pud() and gup_huge_pgd() functions in mm/gup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU96856

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44951

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sc16is7xx_set_baud(), sc16is7xx_handle_rx() and sc16is7xx_handle_tx() functions in drivers/tty/serial/sc16is7xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper Initialization

EUVDB-ID: #VU97184

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45021

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the memcg_write_event_control() function in mm/memcontrol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU97259

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46685

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pcs_get_function() function in drivers/pinctrl/pinctrl-single.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper locking

EUVDB-ID: #VU97264

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46702

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tb_switch_remove() function in drivers/thunderbolt/switch.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) NULL pointer dereference

EUVDB-ID: #VU97530

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46735

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ublk_ctrl_start_recovery() function in drivers/block/ublk_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU97503

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46743

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the of_irq_parse_one() function in drivers/of/irq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper error handling

EUVDB-ID: #VU97813

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46809

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the get_ss_info_v3_1(), get_ss_info_from_internal_ss_info_tbl_V2_1(), get_ss_info_from_ss_info_table(), get_ss_entry_number_from_ss_info_tbl(), get_ss_entry_number_from_internal_ss_info_tbl_v2_1() and get_ss_entry_number_from_internal_ss_info_tbl_V3_1() functions in drivers/gpu/drm/amd/display/dc/bios/bios_parser.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Input validation error

EUVDB-ID: #VU97843

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46815

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the build_watermark_ranges() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn21/rn_clk_mgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU97799

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46824

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the iommufd_hwpt_nested_alloc() function in drivers/iommu/iommufd/hw_pagetable.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU97778

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46831

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vcap_api_encode_rule_test() function in drivers/net/ethernet/microchip/vcap/vcap_api_kunit.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper locking

EUVDB-ID: #VU99031

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47679

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the spin_lock() function in fs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Out-of-bounds read

EUVDB-ID: #VU98922

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47686

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ep93xx_div_recalc_rate() function in arch/arm/mach-ep93xx/clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) NULL pointer dereference

EUVDB-ID: #VU98982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47688

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the module_add_driver() function in drivers/base/module.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper error handling

EUVDB-ID: #VU99080

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47690

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the f2fs_get_parent() and f2fs_lookup() functions in fs/f2fs/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU98900

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47691

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the f2fs_shutdown() function in fs/f2fs/super.c, within the f2fs_ioc_abort_atomic_write(), f2fs_do_shutdown() and f2fs_ioc_shutdown() functions in fs/f2fs/file.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Use-after-free

EUVDB-ID: #VU98899

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47696

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the iw_cm_init() function in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) NULL pointer dereference

EUVDB-ID: #VU98985

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47699

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nilfs_btree_root_broken() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Division by zero

EUVDB-ID: #VU99118

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47700

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the ext4_block_group_meta_init(), __ext4_fill_super() and __ext4_remount() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU98898

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47701

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_find_inline_entry() function in fs/ext4/inline.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Incorrect calculation

EUVDB-ID: #VU99189

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47703

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the mark_reg_unknown(), check_packet_access(), check_ctx_access(), check_stack_access_within_bounds(), check_mem_access() and check_return_code() functions in kernel/bpf/verifier.c, within the btf_ctx_access() function in kernel/bpf/btf.c, within the BTF_SET_START() function in kernel/bpf/bpf_lsm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) NULL pointer dereference

EUVDB-ID: #VU98986

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47704

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the set_hpo_dp_throttled_vcp_size() and disable_hpo_dp_link_output() functions in drivers/gpu/drm/amd/display/dc/link/hwss/link_hwss_hpo_dp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) NULL pointer dereference

EUVDB-ID: #VU98987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47705

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the blk_add_partition() function in block/partitions/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Memory leak

EUVDB-ID: #VU98863

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47719

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iopt_alloc_iova() function in drivers/iommu/iommufd/io_pagetable.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Input validation error

EUVDB-ID: #VU99231

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47727

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the handle_mmio() function in arch/x86/coco/tdx/tdx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Improper locking

EUVDB-ID: #VU99021

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47739

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the padata_do_serial() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Incorrect calculation

EUVDB-ID: #VU99188

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47742

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the fw_abort_batch_reqs() and _request_firmware() functions in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Improper locking

EUVDB-ID: #VU99027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47744

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the EXPORT_SYMBOL_GPL(), kvm_online_cpu(), hardware_disable_nolock(), hardware_disable_all_nolock(), hardware_enable_all() and kvm_suspend() functions in virt/kvm/kvm_main.c, within the cpus_read_lock() function in Documentation/virt/kvm/locking.rst. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use-after-free

EUVDB-ID: #VU98889

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47748

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vhost_vdpa_setup_vq_irq(), vhost_vdpa_vring_ioctl() and vhost_vdpa_open() functions in drivers/vhost/vdpa.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Out-of-bounds read

EUVDB-ID: #VU98914

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47751

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the kirin_pcie_parse_port() function in drivers/pci/controller/dwc/pcie-kirin.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Input validation error

EUVDB-ID: #VU99045

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47752

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vdec_h264_slice_decode() function in drivers/media/platform/mediatek/vcodec/decoder/vdec/vdec_h264_req_if.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Input validation error

EUVDB-ID: #VU99046

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47753

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vdec_vp8_slice_decode() function in drivers/media/platform/mediatek/vcodec/decoder/vdec/vdec_vp8_req_if.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) NULL pointer dereference

EUVDB-ID: #VU98976

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47756

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ks_pcie_quirk() function in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) NULL pointer dereference

EUVDB-ID: #VU98974

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49850

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the bpf_core_apply() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Use-after-free

EUVDB-ID: #VU98891

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49852

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the efc_nport_vport_del() function in drivers/scsi/elx/libefc/efc_nport.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Buffer overflow

EUVDB-ID: #VU99152

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49858

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the efi_retrieve_tpm2_eventlog() function in drivers/firmware/efi/libstub/tpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Input validation error

EUVDB-ID: #VU99230

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49859

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the f2fs_defragment_range(), f2fs_move_file_range() and f2fs_ioc_set_pin_file() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Buffer overflow

EUVDB-ID: #VU99194

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49860

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the acpi_device_setup_files() function in drivers/acpi/device_sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Off-by-one

EUVDB-ID: #VU99088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49862

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the get_rpi() function in drivers/powercap/intel_rapl_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Memory leak

EUVDB-ID: #VU98851

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49870

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cachefiles_open_file(), fput() and cachefiles_look_up_object() functions in fs/cachefiles/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) NULL pointer dereference

EUVDB-ID: #VU98968

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49871

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the adp5589_keypad_add() and adp5589_probe() functions in drivers/input/keyboard/adp5589-keys.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Use-after-free

EUVDB-ID: #VU98884

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49874

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svc_i3c_master_remove() function in drivers/i3c/master/svc-i3c-master.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) NULL pointer dereference

EUVDB-ID: #VU98966

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49877

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) NULL pointer dereference

EUVDB-ID: #VU98965

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49879

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the omapdrm_init() and omap_gem_deinit() functions in drivers/gpu/drm/omapdrm/omap_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory leak

EUVDB-ID: #VU98852

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49881

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the get_ext_path() function in fs/ext4/move_extent.c, within the ext4_find_extent() and ext4_split_extent_at() functions in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Improper error handling

EUVDB-ID: #VU99076

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49882

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ext4_ext_try_to_merge_up() function in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Use-after-free

EUVDB-ID: #VU98866

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49883

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Use-after-free

EUVDB-ID: #VU98867

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49884

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Out-of-bounds read

EUVDB-ID: #VU98903

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49886

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the _isst_if_get_pci_dev() function in drivers/platform/x86/intel/speed_select_if/isst_if_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Use-after-free

EUVDB-ID: #VU98868

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49889

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_split_extents(), ext4_split_extent() and ext4_ext_handle_unwritten_extents() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Input validation error

EUVDB-ID: #VU99224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49892

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn21/display_rq_dlg_calc_21.c, within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn20/display_rq_dlg_calc_20v2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) NULL pointer dereference

EUVDB-ID: #VU98962

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49896

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the are_stream_backends_same() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) NULL pointer dereference

EUVDB-ID: #VU98961

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49898

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the subvp_drr_schedulable() and subvp_vblank_schedulable() functions in drivers/gpu/drm/amd/display/dc/dml/dcn32/dcn32_fpu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) NULL pointer dereference

EUVDB-ID: #VU98960

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49901

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the msm_gpu_init() function in drivers/gpu/drm/msm/msm_gpu.c, within the adreno_gpu_init() function in drivers/gpu/drm/msm/adreno/adreno_gpu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) NULL pointer dereference

EUVDB-ID: #VU98938

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49909

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn32_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/hwss/dcn32/dcn32_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) NULL pointer dereference

EUVDB-ID: #VU98935

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49912

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the planes_changed_for_existing_stream() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) NULL pointer dereference

EUVDB-ID: #VU98934

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49913

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the commit_planes_for_stream() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) NULL pointer dereference

EUVDB-ID: #VU98930

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49917

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn30_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) NULL pointer dereference

EUVDB-ID: #VU98924

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49922

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the create_validate_stream_for_sink(), amdgpu_dm_commit_streams() and amdgpu_dm_atomic_commit_tail() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Use-after-free

EUVDB-ID: #VU98870

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49924

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pxafb_remove() function in drivers/video/fbdev/pxafb.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Out-of-bounds read

EUVDB-ID: #VU98907

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49931

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drivers/net/wireless/ath/ath12k/dp_rx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Out-of-bounds read

EUVDB-ID: #VU98906

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49933

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ioc_forgive_debts() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Use-after-free

EUVDB-ID: #VU98872

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49934

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the dump_mapping() function in fs/inode.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Use-after-free

EUVDB-ID: #VU98873

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49936

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xenvif_new_hash() and xenvif_flush_hash() functions in drivers/net/xen-netback/hash.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Improper error handling

EUVDB-ID: #VU99071

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49937

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nl80211_start_radar_detection() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) NULL pointer dereference

EUVDB-ID: #VU98956

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49940

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pppol2tp_session_setsockopt() function in net/l2tp/l2tp_ppp.c, within the l2tp_nl_cmd_session_modify() function in net/l2tp/l2tp_netlink.c, within the l2tp_v3_session_get(), l2tp_session_register(), l2tp_recv_common(), EXPORT_SYMBOL_GPL(), l2tp_session_set_header_len() and l2tp_session_create() functions in net/l2tp/l2tp_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Resource management error

EUVDB-ID: #VU99149

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49954

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the static_call_module_notify() function in kernel/static_call_inline.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Resource management error

EUVDB-ID: #VU99172

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49955

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the battery_hook_unregister_unlocked() and battery_hook_register() functions in drivers/acpi/battery.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Input validation error

EUVDB-ID: #VU99044

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49958

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ocfs2_reflink_xattr_inline() function in fs/ocfs2/xattr.c, within the __ocfs2_reflink() function in fs/ocfs2/refcounttree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Use-after-free

EUVDB-ID: #VU98877

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49960

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the flush_work() function in fs/ext4/super.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Resource management error

EUVDB-ID: #VU99173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49961

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ar0521_power_off() and ar0521_power_on() functions in drivers/media/i2c/ar0521.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Improper error handling

EUVDB-ID: #VU99070

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49966

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ocfs2_local_read_info() function in fs/ocfs2/quota_local.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Input validation error

EUVDB-ID: #VU99223

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49967

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the do_split() function in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Input validation error

EUVDB-ID: #VU99226

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49968

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ext4_feature_set_ok() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Buffer overflow

EUVDB-ID: #VU99156

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49973

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Memory leak

EUVDB-ID: #VU98854

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49975

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __create_xol_area() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) NULL pointer dereference

EUVDB-ID: #VU98948

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49978

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __udp_gso_segment() function in net/ipv4/udp_offload.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Use-after-free

EUVDB-ID: #VU98878

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49981

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the venus_remove() function in drivers/media/platform/qcom/venus/core.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Use-after-free

EUVDB-ID: #VU98880

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49983

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_ext_replay_update_ex() function in fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Double free

EUVDB-ID: #VU99058

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49989

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the link_destruct() function in drivers/gpu/drm/amd/display/dc/link/link_factory.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Use-after-free

EUVDB-ID: #VU98883

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49992

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ltdc_crtc_atomic_print_state(), ltdc_plane_atomic_print_state(), ltdc_plane_create(), ltdc_crtc_init(), ltdc_encoder_init(), ltdc_load() and ltdc_unload() functions in drivers/gpu/drm/stm/ltdc.c, within the drv_load() function in drivers/gpu/drm/stm/drv.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Integer overflow

EUVDB-ID: #VU99092

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49994

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the blk_ioctl_discard() and blk_ioctl_secure_erase() functions in block/ioctl.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Buffer overflow

EUVDB-ID: #VU99192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49995

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the bearer_name_validate() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Buffer overflow

EUVDB-ID: #VU99101

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49996

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the parse_reparse_posix() and cifs_reparse_point_to_fattr() functions in fs/smb/client/reparse.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) NULL pointer dereference

EUVDB-ID: #VU98943

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50000

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5e_tir_builder_alloc() function in drivers/net/ethernet/mellanox/mlx5/core/en/tir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Input validation error

EUVDB-ID: #VU99218

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50003

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dmub_hpd_callback() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Improper locking

EUVDB-ID: #VU99011

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50006

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_ind_migrate() function in fs/ext4/migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Resource management error

EUVDB-ID: #VU99167

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50008

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the mwifiex_ret_802_11_scan_ext() function in drivers/net/wireless/marvell/mwifiex/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) NULL pointer dereference

EUVDB-ID: #VU98923

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50009

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amd_pstate_adjust_perf() and amd_pstate_init_prefcore() functions in drivers/cpufreq/amd-pstate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Memory leak

EUVDB-ID: #VU98850

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50013

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the exfat_load_bitmap() function in fs/exfat/balloc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Improper locking

EUVDB-ID: #VU99010

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50014

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __ext4_fill_super() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Buffer overflow

EUVDB-ID: #VU99099

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50015

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ext4_handle_inode_extension(), ext4_dio_write_iter() and ext4_dax_write_iter() functions in fs/ext4/file.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Integer overflow

EUVDB-ID: #VU99090

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50016

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Resource management error

EUVDB-ID: #VU99160

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50019

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the kthread_unpark() function in kernel/kthread.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Buffer overflow

EUVDB-ID: #VU99154

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50022

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the dax_set_mapping() function in drivers/dax/device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Improper locking

EUVDB-ID: #VU99001

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50025

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the fnic_probe() function in drivers/scsi/fnic/fnic_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Improper Initialization

EUVDB-ID: #VU99129

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50026

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the wd33c93_intr() function in drivers/scsi/wd33c93.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Incorrect calculation

EUVDB-ID: #VU99184

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50028

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the thermal_genl_cmd_tz_get_trip(), thermal_genl_cmd_tz_get_temp() and thermal_genl_cmd_tz_get_gov() functions in drivers/thermal/thermal_netlink.c, within the thermal_zone_get_by_id() function in drivers/thermal/thermal_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Double free

EUVDB-ID: #VU99056

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50029

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the hci_enhanced_setup_sync() function in net/bluetooth/hci_conn.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Use of uninitialized resource

EUVDB-ID: #VU99082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50033

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the slhc_remember() function in drivers/net/slip/slhc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Incorrect calculation

EUVDB-ID: #VU99185

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50036

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the dst_destroy() and dst_dev_put() functions in net/core/dst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Improper error handling

EUVDB-ID: #VU99062

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50040

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the igb_io_resume() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Improper locking

EUVDB-ID: #VU98999

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50041

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the i40e_vc_get_vf_resources_msg() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c, within the i40e_add_mac_filter() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Improper locking

EUVDB-ID: #VU98995

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50047

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the smb2_get_enc_key(), crypt_message(), smb3_init_transform_rq() and decrypt_raw_data() functions in fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Double free

EUVDB-ID: #VU99057

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50055

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the bus_remove_file() function in drivers/base/bus.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Input validation error

EUVDB-ID: #VU99205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50058

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the uart_shutdown() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Race condition

EUVDB-ID: #VU99125

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50059

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the switchtec_ntb_remove() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Improper locking

EUVDB-ID: #VU98994

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50060

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __io_cqring_overflow_flush() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Buffer overflow

EUVDB-ID: #VU99190

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50063

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the bpf_prog_map_compatible() function in kernel/bpf/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Information disclosure

EUVDB-ID: #VU99117

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50064

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the zram_destroy_comps() function in drivers/block/zram/zram_drv.c. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Improper locking

EUVDB-ID: #VU99290

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50066

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the move_normal_pmd() function in mm/mremap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Use-after-free

EUVDB-ID: #VU99434

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50067

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uprobe_buffer_init(), prepare_uprobe_buffer() and __uprobe_trace_func() functions in kernel/trace/trace_uprobe.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) NULL pointer dereference

EUVDB-ID: #VU99447

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50070

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the stm32_gpiolib_register_bank() function in drivers/pinctrl/stm32/pinctrl-stm32.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Resource management error

EUVDB-ID: #VU99457

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50072

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the arch/x86/include/asm/nospec-branch.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Out-of-bounds read

EUVDB-ID: #VU99445

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50074

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Buffer overflow

EUVDB-ID: #VU99460

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50076

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the con_font_get() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Resource management error

EUVDB-ID: #VU99458

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50083

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tcp_can_coalesce_send_queue_head() function in net/ipv4/tcp_output.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Memory leak

EUVDB-ID: #VU99441

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50084

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vcap_api_encode_rule_test() function in drivers/net/ethernet/microchip/vcap/vcap_api_kunit.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Use of uninitialized resource

EUVDB-ID: #VU99455

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50087

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the replay_one_name() and check_item_in_log() functions in fs/btrfs/tree-log.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) NULL pointer dereference

EUVDB-ID: #VU99448

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50088

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the add_inode_ref() function in fs/btrfs/tree-log.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-50.0.0.55

python3-perf: before 6.6.0-50.0.0.55

perf-debuginfo: before 6.6.0-50.0.0.55

perf: before 6.6.0-50.0.0.55

kernel-tools-devel: before 6.6.0-50.0.0.55

kernel-tools-debuginfo: before 6.6.0-50.0.0.55

kernel-tools: before 6.6.0-50.0.0.55

kernel-source: before 6.6.0-50.0.0.55

kernel-headers: before 6.6.0-50.0.0.55

kernel-devel: before 6.6.0-50.0.0.55

kernel-debugsource: before 6.6.0-50.0.0.55

kernel-debuginfo: before 6.6.0-50.0.0.55

bpftool-debuginfo: before 6.6.0-50.0.0.55

bpftool: before 6.6.0-50.0.0.55

kernel: before 6.6.0-50.0.0.55

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2367


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###