openEuler 22.03 LTS SP3 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2024-26891
CVE-2024-50199
CVE-2024-53171
CVE-2024-53190
CVE-2024-53237
CVE-2024-53239
CVE-2024-56567
CVE-2024-56595
CVE-2024-56597
CVE-2024-56631
CVE-2024-56633
CVE-2024-56662
CVE-2024-56701
CVE-2024-56759
CWE-ID CWE-667
CWE-416
CWE-369
CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

1) Improper locking

EUVDB-ID: #VU91524

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26891

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the devtlb_invalidation_with_pasid() function in drivers/iommu/intel/pasid.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU100120

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50199

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the unuse_mm() function in mm/swapfile.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU102059

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53171

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the get_znodes_to_commit() function in fs/ubifs/tnc_commit.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper locking

EUVDB-ID: #VU102173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53190

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the efuse_write_1byte() and read_efuse_byte() functions in drivers/net/wireless/realtek/rtlwifi/efuse.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU102069

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53237

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU102070

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53239

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Division by zero

EUVDB-ID: #VU102216

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56567

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU102088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56595

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU102086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56597

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU102024

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56631

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU102025

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56633

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Out-of-bounds read

EUVDB-ID: #VU102077

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56662

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper locking

EUVDB-ID: #VU102158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56701

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dtl_worker_enable() and dtl_worker_disable() functions in arch/powerpc/platforms/pseries/lpar.c, within the dtl_enable() and dtl_disable() functions in arch/powerpc/platforms/pseries/dtl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU102393

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56759

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-246.0.0.148

python3-perf: before 5.10.0-246.0.0.148

perf-debuginfo: before 5.10.0-246.0.0.148

perf: before 5.10.0-246.0.0.148

kernel-tools-devel: before 5.10.0-246.0.0.148

kernel-tools-debuginfo: before 5.10.0-246.0.0.148

kernel-tools: before 5.10.0-246.0.0.148

kernel-source: before 5.10.0-246.0.0.148

kernel-headers: before 5.10.0-246.0.0.148

kernel-devel: before 5.10.0-246.0.0.148

kernel-debugsource: before 5.10.0-246.0.0.148

kernel-debuginfo: before 5.10.0-246.0.0.148

kernel: before 5.10.0-246.0.0.148

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###