Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-48814 CVE-2024-36939 CVE-2024-40904 CVE-2024-40905 |
CWE-ID | CWE-399 CWE-388 CWE-667 CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU94474
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48814
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vsc9953_mdio_bus_alloc() and vsc9953_mdio_bus_free() functions in drivers/net/dsa/ocelot/seville_vsc9953.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-220.0.0.119
python3-perf: before 5.10.0-220.0.0.119
perf-debuginfo: before 5.10.0-220.0.0.119
perf: before 5.10.0-220.0.0.119
kernel-tools-devel: before 5.10.0-220.0.0.119
kernel-tools-debuginfo: before 5.10.0-220.0.0.119
kernel-tools: before 5.10.0-220.0.0.119
kernel-source: before 5.10.0-220.0.0.119
kernel-headers: before 5.10.0-220.0.0.119
kernel-devel: before 5.10.0-220.0.0.119
kernel-debugsource: before 5.10.0-220.0.0.119
kernel-debuginfo: before 5.10.0-220.0.0.119
bpftool-debuginfo: before 5.10.0-220.0.0.119
bpftool: before 5.10.0-220.0.0.119
kernel: before 5.10.0-220.0.0.119
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1898
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36939
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nfs_net_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-220.0.0.119
python3-perf: before 5.10.0-220.0.0.119
perf-debuginfo: before 5.10.0-220.0.0.119
perf: before 5.10.0-220.0.0.119
kernel-tools-devel: before 5.10.0-220.0.0.119
kernel-tools-debuginfo: before 5.10.0-220.0.0.119
kernel-tools: before 5.10.0-220.0.0.119
kernel-source: before 5.10.0-220.0.0.119
kernel-headers: before 5.10.0-220.0.0.119
kernel-devel: before 5.10.0-220.0.0.119
kernel-debugsource: before 5.10.0-220.0.0.119
kernel-debuginfo: before 5.10.0-220.0.0.119
bpftool-debuginfo: before 5.10.0-220.0.0.119
bpftool: before 5.10.0-220.0.0.119
kernel: before 5.10.0-220.0.0.119
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1898
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94283
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40904
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the wdm_int_callback() function in drivers/usb/class/cdc-wdm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-220.0.0.119
python3-perf: before 5.10.0-220.0.0.119
perf-debuginfo: before 5.10.0-220.0.0.119
perf: before 5.10.0-220.0.0.119
kernel-tools-devel: before 5.10.0-220.0.0.119
kernel-tools-debuginfo: before 5.10.0-220.0.0.119
kernel-tools: before 5.10.0-220.0.0.119
kernel-source: before 5.10.0-220.0.0.119
kernel-headers: before 5.10.0-220.0.0.119
kernel-devel: before 5.10.0-220.0.0.119
kernel-debugsource: before 5.10.0-220.0.0.119
kernel-debuginfo: before 5.10.0-220.0.0.119
bpftool-debuginfo: before 5.10.0-220.0.0.119
bpftool: before 5.10.0-220.0.0.119
kernel: before 5.10.0-220.0.0.119
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1898
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94257
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40905
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rt6_get_pcpu_route() function in net/ipv6/route.c, within the __fib6_drop_pcpu_from() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-220.0.0.119
python3-perf: before 5.10.0-220.0.0.119
perf-debuginfo: before 5.10.0-220.0.0.119
perf: before 5.10.0-220.0.0.119
kernel-tools-devel: before 5.10.0-220.0.0.119
kernel-tools-debuginfo: before 5.10.0-220.0.0.119
kernel-tools: before 5.10.0-220.0.0.119
kernel-source: before 5.10.0-220.0.0.119
kernel-headers: before 5.10.0-220.0.0.119
kernel-devel: before 5.10.0-220.0.0.119
kernel-debugsource: before 5.10.0-220.0.0.119
kernel-debuginfo: before 5.10.0-220.0.0.119
bpftool-debuginfo: before 5.10.0-220.0.0.119
bpftool: before 5.10.0-220.0.0.119
kernel: before 5.10.0-220.0.0.119
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1898
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.