Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 13 |
CVE-ID | CVE-2021-47182 CVE-2021-47199 CVE-2021-47211 CVE-2023-52609 CVE-2023-52610 CVE-2023-52616 CVE-2023-52618 CVE-2024-26635 CVE-2024-26636 CVE-2024-26640 CVE-2024-26641 CVE-2024-26752 CVE-2024-26766 |
CWE-ID | CWE-119 CWE-401 CWE-476 CWE-362 CWE-665 CWE-908 CWE-20 CWE-399 CWE-824 CWE-682 CWE-193 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system kernel-tools Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component python3-perf-debuginfo Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 13 vulnerabilities.
EUVDB-ID: #VU89395
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47182
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the scsi_mode_sense() function in drivers/scsi/scsi_lib.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90476
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47199
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the parse_tc_nic_actions() and parse_tc_fdb_actions() functions in drivers/net/ethernet/mellanox/mlx5/core/en_tc.c, within the mlx5_tc_ct_match_add(), mlx5_tc_ct_parse_action() and __mlx5_tc_ct_flow_offload_clear() functions in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89394
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47211
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the snd_usb_set_sample_rate_v2v3() function in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91484
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52609
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the binder_update_page_range() function in drivers/android/binder_alloc.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89382
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52610
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak in net/sched/act_ct.c. A local user can force the kernel to leak memory and perform denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91556
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52616
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93617
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52618
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the rnbd_srv_get_full_path() function in drivers/block/rnbd/rnbd-srv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90880
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26635
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the cpu_to_be16() function in net/llc/llc_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90859
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26636
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the llc_ui_sendmsg() function in net/llc/af_llc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89397
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26640
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the skb_advance_to_frag() function in net/ipv4/tcp.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89396
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26641
CWE-ID:
CWE-824 - Access of Uninitialized Pointer
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89392
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26752
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the l2tp_ip6_sendmsg() function in net/l2tp/l2tp_ip6.c. A local user can perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89678
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26766
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an off-by-one error within the _pad_sdma_tx_descs() function in drivers/infiniband/hw/hfi1/sdma.c. A local user can trigger an off-by-one error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
kernel-tools: before 5.10.0-198.0.0.111
perf: before 5.10.0-198.0.0.111
kernel-tools-debuginfo: before 5.10.0-198.0.0.111
python3-perf-debuginfo: before 5.10.0-198.0.0.111
kernel-headers: before 5.10.0-198.0.0.111
kernel-devel: before 5.10.0-198.0.0.111
kernel-debuginfo: before 5.10.0-198.0.0.111
python3-perf: before 5.10.0-198.0.0.111
perf-debuginfo: before 5.10.0-198.0.0.111
kernel-tools-devel: before 5.10.0-198.0.0.111
kernel-debugsource: before 5.10.0-198.0.0.111
kernel-source: before 5.10.0-198.0.0.111
kernel: before 5.10.0-198.0.0.111
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1566
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.