Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2020-14351 CVE-2020-27675 CVE-2020-25656 CVE-2020-12352 CVE-2020-29661 CVE-2020-27777 CVE-2020-29660 CVE-2020-29569 CVE-2020-27815 CVE-2020-27830 |
CWE-ID | CWE-416 CWE-476 CWE-284 CWE-667 CWE-862 CWE-252 CWE-125 |
Exploitation vector | Local network |
Public exploit |
Public exploit code for vulnerability #4 is available. Public exploit code for vulnerability #5 is available. |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component python2-perf-debuginfo Operating systems & Components / Operating system package or component python2-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU51544
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-14351
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the perf subsystem. A local user with permission to monitor perf events cam corrupt memory and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83584
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-27675
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in drivers/xen/events/events_base.c. A malicious guest can trigger a dom0 crash by sending events for a paravirtualized device while simultaneously performing its reconfiguration.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51547
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-25656
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in the way the console subsystem uses KDGKBSENT and KDSKBSENT IOCTLs. A local user can run a specially crafted program to trigger an out-of-bounds read and gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU47546
Risk: Medium
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2020-12352
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in BlueZ implementation in Linux kernel. A remote attacker on the local network can pass specially crafted input to the application and gain access to sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU51543
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2020-29661
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a escalate privileges on the system.
The vulnerability exists due to locking error in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. An local user can exploit this vulnerability to trigger a use-after-free error against TIOCSPGRP and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU56242
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-27777
CWE-ID:
CWE-862 - Missing Authorization
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way RTAS handles memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like user could use this flaw to further increase their privileges to that of a running kernel.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57039
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-29660
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to double-locking error in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c. An authenticated local user can exploit this vulnerability to perform a read-after-free attack against TIOCGSID and gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56816
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-29569
CWE-ID:
CWE-252 - Unchecked Return Value
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the target system.
The vulnerability exists due to an unchecked return value. A local user can cause a denial of service (DoS) condition, leading to privilege escalation and information leaks.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU49169
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-27815
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in fs/jfs/jfs_dmap.c. A local user can trigger out-of-bounds read error and crash the kernel.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-27830
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS
python3-perf-debuginfo: before 4.19.90-2101.1.0.0055
python3-perf: before 4.19.90-2101.1.0.0055
python2-perf-debuginfo: before 4.19.90-2101.1.0.0055
python2-perf: before 4.19.90-2101.1.0.0055
perf-debuginfo: before 4.19.90-2101.1.0.0055
perf: before 4.19.90-2101.1.0.0055
kernel-tools-devel: before 4.19.90-2101.1.0.0055
kernel-tools-debuginfo: before 4.19.90-2101.1.0.0055
kernel-tools: before 4.19.90-2101.1.0.0055
kernel-source: before 4.19.90-2101.1.0.0055
kernel-devel: before 4.19.90-2101.1.0.0055
kernel-debugsource: before 4.19.90-2101.1.0.0055
kernel-debuginfo: before 4.19.90-2101.1.0.0055
bpftool-debuginfo: before 4.19.90-2101.1.0.0055
bpftool: before 4.19.90-2101.1.0.0055
kernel: before 4.19.90-2101.1.0.0055
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1003
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.