Risk | Low |
Patch available | YES |
Number of vulnerabilities | 62 |
CVE-ID | CVE-2023-52917 CVE-2023-52918 CVE-2024-35949 CVE-2024-35964 CVE-2024-36884 CVE-2024-42301 CVE-2024-43858 CVE-2024-43867 CVE-2024-43871 CVE-2024-44982 CVE-2024-44997 CVE-2024-46675 CVE-2024-46677 CVE-2024-46724 CVE-2024-46749 CVE-2024-46757 CVE-2024-46775 CVE-2024-46782 CVE-2024-46802 CVE-2024-46853 CVE-2024-46871 CVE-2024-47659 CVE-2024-47660 CVE-2024-47661 CVE-2024-47667 CVE-2024-47681 CVE-2024-47683 CVE-2024-47684 CVE-2024-47685 CVE-2024-47689 CVE-2024-47692 CVE-2024-47695 CVE-2024-47698 CVE-2024-47709 CVE-2024-47710 CVE-2024-47720 CVE-2024-47737 CVE-2024-47743 CVE-2024-47757 CVE-2024-49855 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49895 CVE-2024-49900 CVE-2024-49902 CVE-2024-49903 CVE-2024-49911 CVE-2024-49918 CVE-2024-49919 CVE-2024-49927 CVE-2024-49965 CVE-2024-49969 CVE-2024-49974 CVE-2024-49976 CVE-2024-49985 CVE-2024-50007 CVE-2024-50012 CVE-2024-50046 CVE-2024-50049 CVE-2024-50057 CVE-2024-50065 |
CWE-ID | CWE-476 CWE-125 CWE-20 CWE-191 CWE-401 CWE-416 CWE-119 CWE-667 CWE-908 CWE-399 CWE-388 CWE-682 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 62 vulnerabilities.
EUVDB-ID: #VU98973
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52917
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ndev_init_debugfs() function in drivers/ntb/hw/intel/ntb_hw_gen1.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99254
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cx23885_video_register() function in drivers/media/pci/cx23885/cx23885-video.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35949
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __btrfs_check_leaf() and __btrfs_check_node() functions in fs/btrfs/tree-checker.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93796
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35964
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the iso_sock_setsockopt() function in net/bluetooth/iso.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90382
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36884
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nvidia_smmu_context_fault() function in drivers/iommu/arm/arm-smmu/arm-smmu-nvidia.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96113
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43858
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the diSync() and diRead() functions in fs/jfs/jfs_imap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96301
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43867
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nouveau_gem_prime_import_sg_table() function in drivers/gpu/drm/nouveau/nouveau_prime.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96828
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44982
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dpu_plane_prepare_fb() function in drivers/gpu/drm/msm/disp/dpu1/dpu_plane.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96841
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44997
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mtk_wed_setup_tc_block_cb() and mtk_wed_setup_tc_block() functions in drivers/net/ethernet/mediatek/mtk_wed.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46675
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dwc3_event_buffers_setup() function in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97257
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46677
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gtp_encap_enable_socket() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46724
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the df_v1_7_get_hbm_channel_number() function in drivers/gpu/drm/amd/amdgpu/df_v1_7.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97526
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46749
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btnxpuart_close() and btnxpuart_flush() functions in drivers/bluetooth/btnxpuart.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97552
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46757
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the store_temp_offset() function in drivers/hwmon/nct6775.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97568
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46775
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the perform_link_training_with_retries() function in drivers/gpu/drm/amd/display/dc/link/protocols/link_dp_training.c, within the hubbub2_program_watermarks() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_hubbub.c, within the dc_dmub_srv_cmd_run_list() and dc_dmub_srv_get_visual_confirm_color_cmd() functions in drivers/gpu/drm/amd/display/dc/dc_dmub_srv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97496
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46782
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ila_xlat_init_net() and ila_xlat_exit_net() functions in net/ipv6/ila/ila_xlat.c, within the ila_pre_exit_net() and ila_exit_net() functions in net/ipv6/ila/ila_main.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97838
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46802
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the resource_build_bit_depth_reduction_params() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97782
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nxp_fspi_fill_txfifo() function in drivers/spi/spi-nxp-fspi.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98381
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46871
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98382
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47659
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rcu_read_unlock() function in security/smack/smack_lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98370
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47660
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __fsnotify_recalc_mask() function in fs/notify/mark.c, within the fsnotify_sb_delete(), __fsnotify_update_child_dentry_flags() and __fsnotify_parent() functions in fs/notify/fsnotify.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98371
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47661
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dmub_abm_set_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn21/dcn21_hwseq.c, within the dmub_abm_set_pipe() function in drivers/gpu/drm/amd/display/dc/dce/dmub_abm_lcd.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98380
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47667
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the RTL GENMASK(), to_keystone_pcie(), ks_pcie_start_link() and ks_pcie_quirk() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47681
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mt7996_mcu_sta_bfer_he() function in drivers/net/wireless/mediatek/mt76/mt7996/mcu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98979
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47683
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the is_dsc_need_re_compute() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47684
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/net/tcp.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47685
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_reject_ip6_tcphdr_put() function in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99034
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47689
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the f2fs_handle_critical_error() function in fs/f2fs/super.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47692
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __cld_pipe_inprogress_downcall() function in fs/nfsd/nfs4recover.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98921
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47695
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the init_conns() function in drivers/infiniband/ulp/rtrs/rtrs-clt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98919
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47698
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rtl2832_pid_filter() function in drivers/media/dvb-frontends/rtl2832.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99177
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47709
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47710
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sock_hash_free() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47720
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn30_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47737
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the idmap_id_to_name() function in fs/nfsd/nfs4idmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98972
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47743
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the find_asymmetric_key() function in crypto/asymmetric_keys/asymmetric_type.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98913
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47757
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nilfs_btree_check_delete() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98893
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nbd_requeue_cmd() and nbd_xmit_timeout() functions in drivers/block/nbd.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49866
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the osnoise_hotplug_workfn() function in kernel/trace/trace_osnoise.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98885
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49867
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98969
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49868
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btrfs_update_reloc_root() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98911
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49895
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm3_helper_translate_curve_to_degamma_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49900
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ea_get() function in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98910
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49902
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() and dbFindLeaf() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98869
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49903
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the jfs_issue_discard() and jfs_ioc_trim() functions in fs/jfs/jfs_discard.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98936
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49911
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_acquire_idle_pipe_for_head_pipe_in_layer() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49919
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn201_acquire_free_pipe_for_layer() function in drivers/gpu/drm/amd/display/dc/resource/dcn201/dcn201_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49927
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ioapic_mask_entry(), __remove_pin_from_irq(), alloc_isa_irq_from_domain() and mp_irqdomain_alloc() functions in arch/x86/kernel/apic/io_apic.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49965
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ocfs2_read_blocks() function in fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98905
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49969
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm3_helper_translate_curve_to_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99220
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49974
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nfs4_state_create_net() function in fs/nfsd/nfs4state.c, within the nfs4_put_copy() and nfsd4_copy() functions in fs/nfsd/nfs4proc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99015
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49976
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the stop_kthread() and stop_per_cpu_kthreads() functions in kernel/trace/trace_osnoise.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99013
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49985
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the stm32f7_i2c_runtime_suspend() and stm32f7_i2c_runtime_resume() functions in drivers/i2c/busses/i2c-stm32f7.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98902
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50007
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the HPIMSGX__init() function in sound/pci/asihpi/hpimsgx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99186
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50012
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the include/linux/cpufreq.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50046
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nfs42_complete_copies() function in fs/nfs/nfs4state.c, within the handle_async_copy() function in fs/nfs/nfs42proc.c, within the nfs_alloc_server() function in fs/nfs/client.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50049
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dc_validate_seamless_boot_timing() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50057
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tps6598x_remove() function in drivers/usb/typec/tipd/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98993
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50065
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ntfs_d_hash() function in fs/ntfs3/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-48.0.0.53
python3-perf: before 6.6.0-48.0.0.53
perf-debuginfo: before 6.6.0-48.0.0.53
perf: before 6.6.0-48.0.0.53
kernel-tools-devel: before 6.6.0-48.0.0.53
kernel-tools-debuginfo: before 6.6.0-48.0.0.53
kernel-tools: before 6.6.0-48.0.0.53
kernel-source: before 6.6.0-48.0.0.53
kernel-headers: before 6.6.0-48.0.0.53
kernel-devel: before 6.6.0-48.0.0.53
kernel-debugsource: before 6.6.0-48.0.0.53
kernel-debuginfo: before 6.6.0-48.0.0.53
bpftool-debuginfo: before 6.6.0-48.0.0.53
bpftool: before 6.6.0-48.0.0.53
kernel: before 6.6.0-48.0.0.53
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2325
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.