Risk | Low |
Patch available | YES |
Number of vulnerabilities | 27 |
CVE-ID | CVE-2024-44950 CVE-2024-46813 CVE-2024-47707 CVE-2024-47718 CVE-2024-49891 CVE-2024-49930 CVE-2024-49938 CVE-2024-49944 CVE-2024-49997 CVE-2024-50024 CVE-2024-50039 CVE-2024-50044 CVE-2024-50135 CVE-2024-50148 CVE-2024-50171 CVE-2024-50196 CVE-2024-50208 CVE-2024-50209 CVE-2024-50234 CVE-2024-50236 CVE-2024-50299 CVE-2024-53059 CVE-2024-53063 CVE-2024-53073 CVE-2024-53090 CVE-2024-53099 CVE-2024-53101 |
CWE-ID | CWE-399 CWE-125 CWE-476 CWE-416 CWE-20 CWE-119 CWE-835 CWE-667 CWE-401 CWE-908 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 27 vulnerabilities.
EUVDB-ID: #VU96875
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44950
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sc16is7xx_set_baud() function in drivers/tty/serial/sc16is7xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97785
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46813
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dc_get_link_at_index() function in drivers/gpu/drm/amd/display/dc/core/dc_link_exports.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98988
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47707
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rt6_uncached_list_flush_dev() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98894
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47718
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtw_wait_firmware_completion() function in drivers/net/wireless/realtek/rtw88/main.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98963
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49891
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lpfc_sli_flush_io_rings() function in drivers/scsi/lpfc/lpfc_sli.c, within the lpfc_abort_handler() function in drivers/scsi/lpfc/lpfc_scsi.c, within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98908
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49930
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99041
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ath9k_hif_usb_rx_cb() and ath9k_hif_usb_reg_in_cb() functions in drivers/net/wireless/ath/ath9k/hif_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98953
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49944
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49997
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ltq_etop_tx() function in drivers/net/ethernet/lantiq_etop.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50024
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the __netlink_clear_multicast_users() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50039
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98997
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50044
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rfcomm_sock_ioctl() function in net/bluetooth/rfcomm/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99826
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50135
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nvme_pci_nr_maps() and nvme_reset_work() functions in drivers/nvme/host/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50148
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bnep_init() function in net/bluetooth/bnep/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100056
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50171
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_sysport_xmit() function in drivers/net/ethernet/broadcom/bcmsysport.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100142
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50196
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the ocelot_irq_handler() function in drivers/pinctrl/pinctrl-ocelot.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100141
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50208
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the bnxt_qplib_alloc_init_hwq() function in drivers/infiniband/hw/bnxt_re/qplib_res.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50209
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bnxt_qplib_alloc_init_hwq() function in drivers/infiniband/hw/bnxt_re/qplib_res.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50234
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the il_pci_resume() function in drivers/net/wireless/intel/iwlegacy/common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50236
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the wmi_process_mgmt_tx_comp() and ath10k_wmi_mgmt_tx_clean_up_pending() functions in drivers/net/wireless/ath/ath10k/wmi.c, within the ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() function in drivers/net/wireless/ath/ath10k/wmi-tlv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100631
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100728
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53059
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the iwl_mvm_disconnect_iterator() and iwl_mvm_send_recovery_cmd() functions in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100741
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53063
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DECLARE_RWSEM() and dvb_register_device() functions in drivers/media/dvb-core/dvbdev.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100738
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53073
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nfsd4_copy() function in fs/nfsd/nfs4proc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100833
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53090
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the afs_deferred_free_worker(), afs_alloc_call(), afs_put_call(), afs_wake_up_call_waiter() and afs_wake_up_async_call() functions in fs/afs/rxrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53099
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bpf_link_show_fdinfo() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100940
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53101
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-239.0.0.141
python3-perf: before 5.10.0-239.0.0.141
perf-debuginfo: before 5.10.0-239.0.0.141
perf: before 5.10.0-239.0.0.141
kernel-tools-devel: before 5.10.0-239.0.0.141
kernel-tools-debuginfo: before 5.10.0-239.0.0.141
kernel-tools: before 5.10.0-239.0.0.141
kernel-source: before 5.10.0-239.0.0.141
kernel-headers: before 5.10.0-239.0.0.141
kernel-devel: before 5.10.0-239.0.0.141
kernel-debugsource: before 5.10.0-239.0.0.141
kernel-debuginfo: before 5.10.0-239.0.0.141
kernel: before 5.10.0-239.0.0.141
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.