Risk | Low |
Patch available | YES |
Number of vulnerabilities | 20 |
CVE-ID | CVE-2024-36972 CVE-2024-40954 CVE-2024-40958 CVE-2024-41057 CVE-2024-42159 CVE-2024-43873 CVE-2024-44977 CVE-2024-44983 CVE-2024-44998 CVE-2024-46746 CVE-2024-49853 CVE-2024-49986 CVE-2024-50121 CVE-2024-50125 CVE-2024-50280 CVE-2024-53070 CVE-2024-53095 CVE-2024-53108 CVE-2024-53129 CVE-2024-53142 |
CWE-ID | CWE-125 CWE-416 CWE-20 CWE-908 CWE-415 CWE-399 CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 20 vulnerabilities.
EUVDB-ID: #VU91664
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36972
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the queue_oob(), unix_stream_recv_urg() and manage_oob() functions in net/unix/af_unix.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94217
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40954
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sk_common_release() function in net/core/sock.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94215
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40958
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94945
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_free_volume() function in fs/cachefiles/volume.c, within the cachefiles_withdraw_objects() and cachefiles_withdraw_cache() functions in fs/cachefiles/cache.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95089
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42159
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mpi3mr_sas_port_add() function in drivers/scsi/mpi3mr/mpi3mr_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96300
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43873
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the vhost_vsock_dev_open() and vhost_vsock_set_features() functions in drivers/vhost/vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96844
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44977
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ta_if_load_debugfs_write() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96869
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44983
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_flow_skb_encap_protocol() function in net/netfilter/nf_flow_table_ip.c, within the nf_flow_offload_inet_hook() function in net/netfilter/nf_flow_table_inet.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96842
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44998
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dequeue_rx() function in drivers/atm/idt77252.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97494
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46746
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdtp_hid_remove() function in drivers/hid/amd-sfh-hid/amd_sfh_hid.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99059
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49853
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the scmi_optee_chan_free() function in drivers/firmware/arm_scmi/optee.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98881
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49986
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the x86_android_tablet_probe() function in drivers/platform/x86/x86-android-tablets/core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99804
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50121
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfs4_state_shutdown_net() function in fs/nfsd/nfs4state.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99806
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50125
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SCO_CONN_TIMEOUT(), sco_sock_timeout() and sco_conn_del() functions in net/bluetooth/sco.c, within the bt_sock_unlink() function in net/bluetooth/af_bluetooth.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100614
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100737
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53070
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dwc3_suspend_common() function in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100830
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53095
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the clean_demultiplex_info(), cifs_put_tcp_session() and generic_ip_connect() functions in fs/smb/client/connect.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101101
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53108
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the parse_amd_vsdb() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53129
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vop_plane_atomic_async_check() function in drivers/gpu/drm/rockchip/rockchip_drm_vop.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101347
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53142
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the do_name() and do_copy() functions in init/initramfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-72.0.0.64
python3-perf: before 6.6.0-72.0.0.64
perf-debuginfo: before 6.6.0-72.0.0.64
perf: before 6.6.0-72.0.0.64
kernel-tools-devel: before 6.6.0-72.0.0.64
kernel-tools-debuginfo: before 6.6.0-72.0.0.64
kernel-tools: before 6.6.0-72.0.0.64
kernel-source: before 6.6.0-72.0.0.64
kernel-headers: before 6.6.0-72.0.0.64
kernel-devel: before 6.6.0-72.0.0.64
kernel-debugsource: before 6.6.0-72.0.0.64
kernel-debuginfo: before 6.6.0-72.0.0.64
bpftool-debuginfo: before 6.6.0-72.0.0.64
bpftool: before 6.6.0-72.0.0.64
kernel: before 6.6.0-72.0.0.64
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2590
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.