Risk | Low |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2024-50148 CVE-2024-50230 CVE-2024-50236 CVE-2024-50262 CVE-2024-50265 CVE-2024-50299 CVE-2024-53052 CVE-2024-53060 CVE-2024-53101 |
CWE-ID | CWE-399 CWE-20 CWE-401 CWE-125 CWE-667 CWE-476 CWE-908 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component python2-perf-debuginfo Operating systems & Components / Operating system package or component python2-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU100087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50148
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bnep_init() function in net/bluetooth/bnep/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50230
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nilfs_clear_dirty_page() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50236
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the wmi_process_mgmt_tx_comp() and ath10k_wmi_mgmt_tx_clean_up_pending() functions in drivers/net/wireless/ath/ath10k/wmi.c, within the ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() function in drivers/net/wireless/ath/ath10k/wmi-tlv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50262
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100610
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50265
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ocfs2_xa_remove() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100631
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100720
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53052
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the io_write_prep() and io_write() functions in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100713
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53060
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_atif_call() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100940
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53101
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2412.1.0.0306
python3-perf: before 4.19.90-2412.1.0.0306
python2-perf-debuginfo: before 4.19.90-2412.1.0.0306
python2-perf: before 4.19.90-2412.1.0.0306
perf-debuginfo: before 4.19.90-2412.1.0.0306
perf: before 4.19.90-2412.1.0.0306
kernel-tools-devel: before 4.19.90-2412.1.0.0306
kernel-tools-debuginfo: before 4.19.90-2412.1.0.0306
kernel-tools: before 4.19.90-2412.1.0.0306
kernel-source: before 4.19.90-2412.1.0.0306
kernel-devel: before 4.19.90-2412.1.0.0306
kernel-debugsource: before 4.19.90-2412.1.0.0306
kernel-debuginfo: before 4.19.90-2412.1.0.0306
bpftool-debuginfo: before 4.19.90-2412.1.0.0306
bpftool: before 4.19.90-2412.1.0.0306
kernel: before 4.19.90-2412.1.0.0306
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2520
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.