Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU96878
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44965
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the pti_clone_pgtable() function in arch/x86/mm/pti.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96870
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44999
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the gtp_dev_xmit() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96883
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45008
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the input_mt_init_slots() function in drivers/input/input-mt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97193
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45025
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the free_fdtable_rcu(), copy_fdtable() and dup_fd() functions in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97173
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45028
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtf_test_write() function in drivers/mmc/core/mmc_test.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97509
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46723
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_cgs_get_firmware_info() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cgs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97540
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46744
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the squashfs_read_inode() function in fs/squashfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97493
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46745
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uinput_validate_absinfo() function in drivers/input/misc/uinput.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97504
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46747
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cougar_fix_g6_mapping() function in drivers/hid/hid-cougar.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97525
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46755
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/net/wireless/marvell/mwifiex/main.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97554
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46759
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the adc128_set_in() and adc128_set_temp() functions in drivers/hwmon/adc128d818.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97501
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2409.6.0.0297
python3-perf: before 4.19.90-2409.6.0.0297
python2-perf-debuginfo: before 4.19.90-2409.6.0.0297
python2-perf: before 4.19.90-2409.6.0.0297
perf-debuginfo: before 4.19.90-2409.6.0.0297
perf: before 4.19.90-2409.6.0.0297
kernel-tools-devel: before 4.19.90-2409.6.0.0297
kernel-tools-debuginfo: before 4.19.90-2409.6.0.0297
kernel-tools: before 4.19.90-2409.6.0.0297
kernel-source: before 4.19.90-2409.6.0.0297
kernel-devel: before 4.19.90-2409.6.0.0297
kernel-debugsource: before 4.19.90-2409.6.0.0297
kernel-debuginfo: before 4.19.90-2409.6.0.0297
bpftool-debuginfo: before 4.19.90-2409.6.0.0297
bpftool: before 4.19.90-2409.6.0.0297
kernel: before 4.19.90-2409.6.0.0297
CPE2.3 External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2184
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.