openEuler 22.03 LTS SP3 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 25
CVE-ID CVE-2024-40927
CVE-2024-47713
CVE-2024-49861
CVE-2024-49863
CVE-2024-49906
CVE-2024-49923
CVE-2024-49977
CVE-2024-49991
CVE-2024-50103
CVE-2024-50116
CVE-2024-50127
CVE-2024-50134
CVE-2024-50187
CVE-2024-50201
CVE-2024-50267
CVE-2024-50272
CVE-2024-50278
CVE-2024-50290
CVE-2024-50292
CVE-2024-50302
CVE-2024-53104
CVE-2024-53110
CVE-2024-53112
CVE-2024-53125
CVE-2024-53130
CWE-ID CWE-416
CWE-667
CWE-908
CWE-476
CWE-20
CWE-388
CWE-119
CWE-399
CWE-835
CWE-125
CWE-191
CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 25 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU94220

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-40927

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xhci_invalidate_cancelled_tds() and xhci_handle_cmd_set_deq() functions in drivers/usb/host/xhci-ring.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU99032

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-47713

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ieee80211_do_stop() function in net/mac80211/iface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use of uninitialized resource

EUVDB-ID: #VU99086

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-49861

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the sizeof() function in net/core/filter.c, within the sizeof() function in kernel/trace/bpf_trace.c, within the arg_type_is_dynptr() function in kernel/bpf/verifier.c, within the sizeof() function in kernel/bpf/syscall.c, within the sizeof() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU98970

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-49863

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vhost_scsi_get_req() function in drivers/vhost/scsi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU98940

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-49906

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer dereference

EUVDB-ID: #VU98950

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-49923

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn21_fast_validate_bw() function in drivers/gpu/drm/amd/display/dc/resource/dcn21/dcn21_resource.c, within the dcn20_fast_validate_bw() function in drivers/gpu/drm/amd/display/dc/resource/dcn20/dcn20_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU99221

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-49977

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the tc_setup_cbs() function in drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU98882

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-49991

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pqm_clean_queue_resource() function in drivers/gpu/drm/amd/amdkfd/kfd_process_queue_manager.c, within the kfd_process_destroy_pdds() function in drivers/gpu/drm/amd/amdkfd/kfd_process.c, within the kfd_free_mqd_cp() function in drivers/gpu/drm/amd/amdkfd/kfd_mqd_manager.c, within the deallocate_hiq_sdma_mqd() function in drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c, within the kfd_gtt_sa_fini() and kgd2kfd_device_exit() functions in drivers/gpu/drm/amd/amdkfd/kfd_device.c, within the kfd_ioctl_create_queue() function in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c, within the amdgpu_amdkfd_free_gtt_mem() function in drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU99814

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50103

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the asoc_qcom_lpass_cpu_platform_probe() function in sound/soc/qcom/lpass-cpu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper error handling

EUVDB-ID: #VU99831

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50116

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nilfs_forget_buffer() and nilfs_clear_dirty_page() functions in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU99808

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50127

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the taprio_change() function in net/sched/sch_taprio.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer overflow

EUVDB-ID: #VU99837

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50134

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the hgsmi_update_pointer_shape() function in drivers/gpu/drm/vboxvideo/hgsmi_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Input validation error

EUVDB-ID: #VU100156

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50187

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vc4_perfmon_open_file() and vc4_perfmon_close_file() functions in drivers/gpu/drm/vc4/vc4_perfmon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Resource management error

EUVDB-ID: #VU100151

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50201

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the radeon_encoder_clones() function in drivers/gpu/drm/radeon/radeon_encoders.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free

EUVDB-ID: #VU100613

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50267

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the edge_bulk_out_data_callback() and edge_bulk_out_cmd_callback() functions in drivers/usb/serial/io_edgeport.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Infinite loop

EUVDB-ID: #VU100640

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50272

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the filemap_read() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Out-of-bounds read

EUVDB-ID: #VU100619

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50278

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the get_cache_dev_size() and cache_preresume() functions in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Integer underflow

EUVDB-ID: #VU100637

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50290

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the cx24116_read_snr_pct() function in drivers/media/dvb-frontends/cx24116.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) NULL pointer dereference

EUVDB-ID: #VU100625

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50292

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the stm32_spdifrx_remove() function in sound/soc/stm/stm32_spdifrx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Memory leak

EUVDB-ID: #VU100611

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-50302

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the hid_alloc_report_buf() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Out-of-bounds read

EUVDB-ID: #VU101102

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-53104

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the uvc_parse_format() function in drivers/media/usb/uvc/uvc_driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Buffer overflow

EUVDB-ID: #VU101116

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-53110

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the vp_vdpa_probe() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU101107

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-53112

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ocfs2_commit_trans() function in fs/ocfs2/resize.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Resource management error

EUVDB-ID: #VU101233

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-53125

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the find_equal_scalars() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) NULL pointer dereference

EUVDB-ID: #VU101225

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-53130

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nilfs_grab_buffer() function in fs/nilfs2/page.c, within the nilfs_mdt_create_block() function in fs/nilfs2/mdt.c, within the nilfs_gccache_submit_read_data() function in fs/nilfs2/gcinode.c, within the nilfs_btnode_create_block() and nilfs_btnode_submit_block() functions in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-240.0.0.142

python3-perf: before 5.10.0-240.0.0.142

perf-debuginfo: before 5.10.0-240.0.0.142

perf: before 5.10.0-240.0.0.142

kernel-tools-devel: before 5.10.0-240.0.0.142

kernel-tools-debuginfo: before 5.10.0-240.0.0.142

kernel-tools: before 5.10.0-240.0.0.142

kernel-source: before 5.10.0-240.0.0.142

kernel-headers: before 5.10.0-240.0.0.142

kernel-devel: before 5.10.0-240.0.0.142

kernel-debugsource: before 5.10.0-240.0.0.142

kernel-debuginfo: before 5.10.0-240.0.0.142

kernel: before 5.10.0-240.0.0.142

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2534


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###