openEuler 24.03 LTS update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 20
CVE-ID CVE-2024-46719
CVE-2024-46794
CVE-2024-46803
CVE-2024-46807
CVE-2024-47663
CVE-2024-47668
CVE-2024-47673
CVE-2024-47693
CVE-2024-47702
CVE-2024-47726
CVE-2024-49920
CVE-2024-50082
CVE-2024-50095
CVE-2024-50120
CVE-2024-50131
CVE-2024-50145
CVE-2024-50152
CVE-2024-50156
CVE-2024-50184
CVE-2024-50186
CWE-ID CWE-476
CWE-401
CWE-369
CWE-119
CWE-399
CWE-20
CWE-667
CWE-388
CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 20 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU97534

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46719

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the drivers/usb/typec/ucsi/ucsi.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU97489

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46794

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mmio_read() function in arch/x86/coco/tdx/tdx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU97792

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46803

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the debug_event_write_work_handler() and kfd_dbg_trap_disable() functions in drivers/gpu/drm/amd/amdkfd/kfd_debug.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU97794

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46807

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amdgpu_device_recover_vram() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Division by zero

EUVDB-ID: #VU98372

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47663

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the ad9834_write_frequency() function in drivers/staging/iio/frequency/ad9834.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer overflow

EUVDB-ID: #VU98376

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47668

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the __genradix_ptr_alloc() function in lib/generic-radix-tree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU98375

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47673

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the iwl_mvm_stop_device() function in drivers/net/wireless/intel/iwlwifi/mvm/ops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Resource management error

EUVDB-ID: #VU99176

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47693

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ib_cache_setup_one() function in drivers/infiniband/core/cache.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU99048

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47702

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bpf_skb_is_valid_access(), xdp_is_valid_access() and flow_dissector_is_valid_access() functions in net/core/filter.c, within the check_packet_access() and check_mem_access() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper locking

EUVDB-ID: #VU99198

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47726

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the f2fs_setattr() and f2fs_fallocate() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU98927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49920

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn32_is_center_timing() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource_helpers.c, within the dcn32_enable_phantom_plane() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the bw_calcs_data_update_from_pplib() function in drivers/gpu/drm/amd/display/dc/resource/dce112/dce112_resource.c, within the reset_dio_stream_encoder() function in drivers/gpu/drm/amd/display/dc/link/hwss/link_hwss_dio.c, within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c, within the dcn20_post_unlock_program_front_end() and dcn20_wait_for_blank_complete() functions in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c, within the hwss_build_fast_sequence() function in drivers/gpu/drm/amd/display/dc/core/dc_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Improper locking

EUVDB-ID: #VU99451

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50082

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rq_qos_wake_function() function in block/blk-rq-qos.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper locking

EUVDB-ID: #VU99828

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50095

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the retry_send() and timeout_sends() functions in drivers/infiniband/core/mad.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Improper error handling

EUVDB-ID: #VU99832

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50120

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the smb3_reconfigure() function in fs/smb/client/fs_context.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper error handling

EUVDB-ID: #VU99833

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50131

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the traceprobe_parse_event_name() function in kernel/trace/trace_probe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU100070

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50145

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the octep_oq_next_pkt() and __octep_oq_process_rx() functions in drivers/net/ethernet/marvell/octeon_ep/octep_rx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU100060

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50152

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_set_ea() function in fs/smb/client/smb2ops.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) NULL pointer dereference

EUVDB-ID: #VU100073

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50156

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the msm_disp_state_dump_regs() and msm_disp_state_print() functions in drivers/gpu/drm/msm/disp/msm_disp_snapshot_util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Resource management error

EUVDB-ID: #VU100143

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50184

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the virtio_pmem_flush() function in drivers/nvdimm/nd_virtio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU100122

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50186

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __sock_create() function in net/socket.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-54.0.0.57

python3-perf: before 6.6.0-54.0.0.57

perf-debuginfo: before 6.6.0-54.0.0.57

perf: before 6.6.0-54.0.0.57

kernel-tools-devel: before 6.6.0-54.0.0.57

kernel-tools-debuginfo: before 6.6.0-54.0.0.57

kernel-tools: before 6.6.0-54.0.0.57

kernel-source: before 6.6.0-54.0.0.57

kernel-headers: before 6.6.0-54.0.0.57

kernel-devel: before 6.6.0-54.0.0.57

kernel-debugsource: before 6.6.0-54.0.0.57

kernel-debuginfo: before 6.6.0-54.0.0.57

bpftool-debuginfo: before 6.6.0-54.0.0.57

bpftool: before 6.6.0-54.0.0.57

kernel: before 6.6.0-54.0.0.57

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2423


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###