openEuler 22.03 LTS SP3 update for kernel



Risk Medium
Patch available YES
Number of vulnerabilities 13
CVE-ID CVE-2021-47182
CVE-2021-47199
CVE-2021-47211
CVE-2023-52609
CVE-2023-52610
CVE-2023-52616
CVE-2023-52618
CVE-2024-26635
CVE-2024-26636
CVE-2024-26640
CVE-2024-26641
CVE-2024-26752
CVE-2024-26766
CWE-ID CWE-119
CWE-401
CWE-476
CWE-362
CWE-665
CWE-908
CWE-20
CWE-399
CWE-824
CWE-682
CWE-193
Exploitation vector Network
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

kernel-tools
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 13 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU89395

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47182

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the scsi_mode_sense() function in drivers/scsi/scsi_lib.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU90476

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47199

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the parse_tc_nic_actions() and parse_tc_fdb_actions() functions in drivers/net/ethernet/mellanox/mlx5/core/en_tc.c, within the mlx5_tc_ct_match_add(), mlx5_tc_ct_parse_action() and __mlx5_tc_ct_flow_offload_clear() functions in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU89394

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47211

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the snd_usb_set_sample_rate_v2v3() function in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Race condition

EUVDB-ID: #VU91484

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52609

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the binder_update_page_range() function in drivers/android/binder_alloc.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU89382

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52610

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak in net/sched/act_ct.c. A local user can force the kernel to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper Initialization

EUVDB-ID: #VU91556

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52616

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Buffer overflow

EUVDB-ID: #VU93617

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52618

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rnbd_srv_get_full_path() function in drivers/block/rnbd/rnbd-srv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use of uninitialized resource

EUVDB-ID: #VU90880

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26635

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the cpu_to_be16() function in net/llc/llc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU90859

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26636

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the llc_ui_sendmsg() function in net/llc/af_llc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Resource management error

EUVDB-ID: #VU89397

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26640

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the skb_advance_to_frag() function in net/ipv4/tcp.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Access of Uninitialized Pointer

EUVDB-ID: #VU89396

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26641

CWE-ID: CWE-824 - Access of Uninitialized Pointer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Incorrect calculation

EUVDB-ID: #VU89392

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26752

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the l2tp_ip6_sendmsg() function in net/l2tp/l2tp_ip6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Off-by-one

EUVDB-ID: #VU89678

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26766

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an off-by-one error within the _pad_sdma_tx_descs() function in drivers/infiniband/hw/hfi1/sdma.c. A local user can trigger an off-by-one error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

kernel-tools: before 5.10.0-198.0.0.111

perf: before 5.10.0-198.0.0.111

kernel-tools-debuginfo: before 5.10.0-198.0.0.111

python3-perf-debuginfo: before 5.10.0-198.0.0.111

kernel-headers: before 5.10.0-198.0.0.111

kernel-devel: before 5.10.0-198.0.0.111

kernel-debuginfo: before 5.10.0-198.0.0.111

python3-perf: before 5.10.0-198.0.0.111

perf-debuginfo: before 5.10.0-198.0.0.111

kernel-tools-devel: before 5.10.0-198.0.0.111

kernel-debugsource: before 5.10.0-198.0.0.111

kernel-source: before 5.10.0-198.0.0.111

kernel: before 5.10.0-198.0.0.111

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###