Risk | Low |
Patch available | YES |
Number of vulnerabilities | 26 |
CVE-ID | CVE-2022-48878 CVE-2022-48953 CVE-2022-49026 CVE-2024-35833 CVE-2024-36005 CVE-2024-36950 CVE-2024-43911 CVE-2024-47663 CVE-2024-47666 CVE-2024-47728 CVE-2024-49914 CVE-2024-49945 CVE-2024-49963 CVE-2024-49982 CVE-2024-50099 CVE-2024-50115 CVE-2024-50138 CVE-2024-50184 CVE-2024-50195 CVE-2024-50198 CVE-2024-50237 CVE-2024-50242 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2023-6270 |
CWE-ID | CWE-416 CWE-399 CWE-415 CWE-401 CWE-388 CWE-476 CWE-369 CWE-667 CWE-125 CWE-908 CWE-20 CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 26 vulnerabilities.
EUVDB-ID: #VU96332
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48878
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qca_serdev_shutdown() function in drivers/bluetooth/hci_qca.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48953
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cmos_check_acpi_rtc_status(), cmos_pnp_probe(), cmos_of_init() and cmos_platform_probe() functions in drivers/rtc/rtc-cmos.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49026
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the e100_xmit_prepare() function in drivers/net/ethernet/intel/e100.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35833
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the drivers/dma/fsl-qdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93190
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36005
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nft_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36950
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96523
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43911
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ieee80211_start_tx_ba_session() function in net/mac80211/agg-tx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98372
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47663
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad9834_write_frequency() function in drivers/staging/iio/frequency/ad9834.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98366
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47666
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pm8001_phy_control() function in drivers/scsi/pm8001/pm8001_sas.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98856
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47728
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the BPF_CALL_5() function in net/core/filter.c, within the BPF_CALL_4() function in kernel/bpf/syscall.c, within the BPF_CALL_4() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98933
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49914
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98875
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49945
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ncsi_unregister_dev() function in net/ncsi/ncsi-manage.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49963
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98879
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49982
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ata_rw_frameinit(), aoecmd_ata_rw(), resend(), probe() and aoecmd_ata_id() functions in drivers/block/aoe/aoecmd.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99824
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50099
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the arm_probe_decode_insn() and arm_kprobe_decode_insn() functions in arch/arm64/kernel/probes/decode-insn.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99810
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50115
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nested_svm_get_tdp_pdptr() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99827
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50138
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bpf_ringbuf_alloc() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50184
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the virtio_pmem_flush() function in drivers/nvdimm/nd_virtio.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50195
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pc_clock_settime() function in kernel/time/posix-clock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50198
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the in_illuminance_period_available_show() function in drivers/iio/light/veml6030.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50237
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ieee80211_get_tx_power() function in net/mac80211/cfg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50242
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ntfs_file_release() function in fs/ntfs3/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100185
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50245
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ntfs_lookup() function in fs/ntfs3/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50246
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mi_enum_attr() function in fs/ntfs3/record.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50247
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the decompress_chunk() function in fs/ntfs3/lznt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91599
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6270
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the aoecmd_cfg_pkts() function in the ATA over Ethernet (AoE) driver. A local user can trigger a use-after-free error and escalate privileges on the system.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
python3-perf-debuginfo: before 5.10.0-136.102.0.183
python3-perf: before 5.10.0-136.102.0.183
perf-debuginfo: before 5.10.0-136.102.0.183
perf: before 5.10.0-136.102.0.183
kernel-tools-devel: before 5.10.0-136.102.0.183
kernel-tools-debuginfo: before 5.10.0-136.102.0.183
kernel-tools: before 5.10.0-136.102.0.183
kernel-source: before 5.10.0-136.102.0.183
kernel-headers: before 5.10.0-136.102.0.183
kernel-devel: before 5.10.0-136.102.0.183
kernel-debugsource: before 5.10.0-136.102.0.183
kernel-debuginfo: before 5.10.0-136.102.0.183
kernel: before 5.10.0-136.102.0.183
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2445
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.