Risk | Low |
Patch available | YES |
Number of vulnerabilities | 20 |
CVE-ID | CVE-2024-24858 CVE-2024-26813 CVE-2024-26857 CVE-2024-26956 CVE-2024-26966 CVE-2024-26969 CVE-2024-26974 CVE-2024-26981 CVE-2024-26996 CVE-2024-27001 CVE-2024-44969 CVE-2024-50279 CVE-2024-53050 CVE-2024-53226 CVE-2024-56549 CVE-2024-56626 CVE-2024-56648 CVE-2024-56690 CVE-2024-56728 CVE-2024-56758 |
CWE-ID | CWE-362 CWE-476 CWE-908 CWE-119 CWE-125 CWE-416 CWE-399 CWE-20 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 20 vulnerabilities.
EUVDB-ID: #VU92720
Risk: Low
CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-24858
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90588
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26813
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vfio_platform_set_irq_unmask(), vfio_automasked_irq_handler(), vfio_irq_handler(), vfio_set_trigger(), vfio_platform_set_irq_trigger(), vfio_platform_set_irqs_ioctl(), vfio_platform_irq_init() and vfio_platform_irq_cleanup() functions in drivers/vfio/platform/vfio_platform_irq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90876
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26857
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the geneve_rx() function in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93155
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26956
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nilfs_direct_lookup_contig() function in fs/nilfs2/direct.c, within the nilfs_btree_lookup_contig() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91394
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26966
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the F() function in drivers/clk/qcom/mmcc-apq8084.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91397
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26969
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the F() function in drivers/clk/qcom/gcc-ipq8074.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90185
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26974
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the adf_device_reset_worker() and adf_dev_aer_schedule_reset() functions in drivers/crypto/qat/qat_common/adf_aer.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90318
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26981
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nilfs_type_by_mode[() function in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90184
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26996
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ncm_set_alt() and ncm_disable() functions in drivers/usb/gadget/function/f_ncm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92969
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27001
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vmk80xx_find_usb_endpoints() function in drivers/comedi/drivers/vmk80xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96885
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44969
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the sclp_sd_store_data() function in drivers/s390/char/sclp_sd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100620
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50279
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the can_resize() function in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100709
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53050
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_dp_hdcp2_get_capability() function in drivers/gpu/drm/i915/display/intel_dp_hdcp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102142
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53226
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hns_roce_set_page() and hns_roce_map_mr_sg() functions in drivers/infiniband/hw/hns/hns_roce_mr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56549
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cachefiles_ondemand_fd_write_iter() and cachefiles_ondemand_fd_llseek() functions in fs/cachefiles/ondemand.c, within the cachefiles_commit_object() and cachefiles_clean_up_object() functions in fs/cachefiles/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102081
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56626
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the smb2_write() function in fs/smb/server/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102079
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56648
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the fill_frame_info() function in net/hsr/hsr_forward.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56690
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pcrypt_aead_encrypt() and pcrypt_aead_decrypt() functions in crypto/pcrypt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102272
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56728
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the otx2_get_pauseparam() and otx2_set_fecparam() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102398
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56758
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the relocate_one_folio() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-247.0.0.149
python3-perf: before 5.10.0-247.0.0.149
perf-debuginfo: before 5.10.0-247.0.0.149
perf: before 5.10.0-247.0.0.149
kernel-tools-devel: before 5.10.0-247.0.0.149
kernel-tools-debuginfo: before 5.10.0-247.0.0.149
kernel-tools: before 5.10.0-247.0.0.149
kernel-source: before 5.10.0-247.0.0.149
kernel-headers: before 5.10.0-247.0.0.149
kernel-devel: before 5.10.0-247.0.0.149
kernel-debugsource: before 5.10.0-247.0.0.149
kernel-debuginfo: before 5.10.0-247.0.0.149
kernel: before 5.10.0-247.0.0.149
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1080
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.