Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 40 |
CVE-ID | CVE-2023-52434 CVE-2023-52480 CVE-2023-52614 CVE-2023-52627 CVE-2023-52913 CVE-2024-24857 CVE-2024-24859 CVE-2024-26659 CVE-2024-26664 CVE-2024-26673 CVE-2024-26747 CVE-2024-26748 CVE-2024-26749 CVE-2024-26753 CVE-2024-26781 CVE-2024-26790 CVE-2024-26793 CVE-2024-26952 CVE-2024-26954 CVE-2024-27004 CVE-2024-36479 CVE-2024-37021 CVE-2024-40965 CVE-2024-50194 CVE-2024-50280 CVE-2024-53131 CVE-2024-53183 CVE-2024-53198 CVE-2024-53201 CVE-2024-56539 CVE-2024-56571 CVE-2024-56588 CVE-2024-56610 CVE-2024-56611 CVE-2024-56623 CVE-2024-56688 CVE-2024-56704 CVE-2024-56715 CVE-2024-56746 CVE-2024-57892 |
CWE-ID | CWE-119 CWE-416 CWE-476 CWE-362 CWE-125 CWE-20 CWE-121 CWE-667 CWE-399 CWE-401 CWE-415 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 40 vulnerabilities.
EUVDB-ID: #VU88283
Risk: Medium
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52434
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90249
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52480
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ksmbd_expire_session(), ksmbd_sessions_deregister() and ksmbd_session_lookup() functions in fs/ksmbd/mgmt/user_session.c, within the ksmbd_conn_alloc() function in fs/ksmbd/connection.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91315
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52614
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the trans_stat_show() function in drivers/devfreq/devfreq.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90612
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52627
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the BIT() function in drivers/iio/adc/ad7091r5.c, within the BIT() and ad7091r_read_event_config() functions in drivers/iio/adc/ad7091r-base.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96337
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52913
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the i915_gem_init__contexts(), gem_context_register() and finalize_create_context_locked() functions in drivers/gpu/drm/i915/gem/i915_gem_context.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92719
Risk: Low
CVSSv4.0: 2.4 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-24857
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to damange or delete data.
A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92721
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-24859
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26659
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the process_isoc_td() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90335
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26664
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the create_core_data() function in drivers/hwmon/coretemp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26673
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the nft_ct_expect_obj_init() function in net/netfilter/nft_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90598
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26747
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the usb_role_switch_get(), fwnode_usb_role_switch_get(), EXPORT_SYMBOL_GPL(), usb_role_switch_find_by_fwnode() and usb_role_switch_register() functions in drivers/usb/roles/class.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90213
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26748
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cdns3_gadget_giveback() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90216
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26749
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cdns3_gadget_ep_disable() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91300
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26753
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to stack overflow within the virtio_crypto_dataq_akcipher_callback() and virtio_crypto_alg_akcipher_init_session() functions in drivers/crypto/virtio/virtio_crypto_akcipher_algs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90785
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26781
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the subflow_get_info() function in net/mptcp/diag.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90784
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26790
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the FSL_QDMA_CMD_PF BIT() and fsl_qdma_comp_fill_memcpy() functions in drivers/dma/fsl-qdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90211
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26793
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gtp_init() function in drivers/net/gtp.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90317
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26952
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to an out-of-bounds read error within the smb2_tree_connect(), smb2_open(), smb2_query_dir(), smb2_get_ea(), smb2_set_info_file(), smb2_set_info(), fsctl_pipe_transceive() and smb2_ioctl() functions in fs/smb/server/smb2pdu.c, within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90321
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26954
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90770
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27004
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the HLIST_HEAD(), clk_pm_runtime_put(), clk_unprepare_unused_subtree(), clk_disable_unused_subtree(), __setup(), clk_disable_unused(), __clk_release() and __clk_register() functions in drivers/clk/clk.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36479
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fpga_bridge_disable(), of_fpga_bridge_get(), fpga_bridge_dev_match(), fpga_bridge_get(), fpga_bridge_put(), ATTRIBUTE_GROUPS(), fpga_bridge_register() and ERR_PTR() functions in drivers/fpga/fpga-bridge.c, within the fpga_bridge_register() function in Documentation/driver-api/fpga/fpga-bridge.rst. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93124
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-37021
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ATTRIBUTE_GROUPS(), fpga_mgr_dev_match(), EXPORT_SYMBOL_GPL(), fpga_mgr_unlock(), fpga_mgr_register_full(), ERR_PTR(), fpga_mgr_register(), devm_fpga_mgr_unregister(), devm_fpga_mgr_register_full() and devm_fpga_mgr_register() functions in drivers/fpga/fpga-mgr.c, within the fpga_mgr_register() and fpga_mgr_register_full() functions in Documentation/driver-api/fpga/fpga-mgr.rst. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40965
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the lpi2c_imx_config() and lpi2c_imx_probe() functions in drivers/i2c/busses/i2c-imx-lpi2c.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50194
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the arch_uprobe_analyze_insn() and arch_uprobe_skip_sstep() functions in arch/arm64/kernel/probes/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100614
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53131
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __nilfs_get_page_block() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102235
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53183
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the net_device_release() function in arch/um/drivers/net_kern.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53198
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xenbus_dev_probe() function in drivers/xen/xenbus/xenbus_probe.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53201
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56539
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102230
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56571
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the uvc_alloc_entity(), uvc_parse_vendor_control(), uvc_parse_standard_control() and uvc_gpio_parse() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56588
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the debugfs_to_reg_name_v3_hw(), debugfs_global_v3_hw_show(), debugfs_axi_v3_hw_show(), debugfs_ras_v3_hw_show(), debugfs_port_v3_hw_show(), debugfs_cq_v3_hw_show(), debugfs_dq_show_slot_v3_hw(), debugfs_iost_v3_hw_show(), debugfs_iost_cache_v3_hw_show(), debugfs_itct_v3_hw_show(), debugfs_itct_cache_v3_hw_show(), debugfs_create_files_v3_hw(), debugfs_release_v3_hw(), debugfs_snapshot_regs_v3_hw(), debugfs_bist_init_v3_hw() and debugfs_init_v3_hw() functions in drivers/scsi/hisi_sas/hisi_sas_v3_hw.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102164
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56610
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the DEFINE_SPINLOCK(), kcsan_skip_report_debugfs(), set_report_filterlist_whitelist(), insert_report_filterlist() and show_info() functions in kernel/kcsan/debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102109
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56611
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the migrate_to_node() function in mm/mempolicy.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102023
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56623
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56688
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56704
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the xen_9pfs_front_free() function in net/9p/trans_xen.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56715
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ionic_lif_register() function in drivers/net/ethernet/pensando/ionic/ionic_lif.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101981
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56746
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sh7760fb_alloc_mem() function in drivers/video/fbdev/sh7760fb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102905
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57892
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP4
python3-perf-debuginfo: before 5.10.0-248.0.0.147
python3-perf: before 5.10.0-248.0.0.147
perf-debuginfo: before 5.10.0-248.0.0.147
perf: before 5.10.0-248.0.0.147
kernel-tools-devel: before 5.10.0-248.0.0.147
kernel-tools-debuginfo: before 5.10.0-248.0.0.147
kernel-tools: before 5.10.0-248.0.0.147
kernel-source: before 5.10.0-248.0.0.147
kernel-headers: before 5.10.0-248.0.0.147
kernel-devel: before 5.10.0-248.0.0.147
kernel-debugsource: before 5.10.0-248.0.0.147
kernel-debuginfo: before 5.10.0-248.0.0.147
bpftool-debuginfo: before 5.10.0-248.0.0.147
bpftool: before 5.10.0-248.0.0.147
kernel: before 5.10.0-248.0.0.147
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1096
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.