Risk | Low |
Patch available | YES |
Number of vulnerabilities | 14 |
CVE-ID | CVE-2024-26891 CVE-2024-50199 CVE-2024-53171 CVE-2024-53190 CVE-2024-53237 CVE-2024-53239 CVE-2024-56567 CVE-2024-56595 CVE-2024-56597 CVE-2024-56631 CVE-2024-56633 CVE-2024-56662 CVE-2024-56701 CVE-2024-56759 |
CWE-ID | CWE-667 CWE-416 CWE-369 CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 14 vulnerabilities.
EUVDB-ID: #VU91524
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26891
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the devtlb_invalidation_with_pasid() function in drivers/iommu/intel/pasid.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100120
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50199
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unuse_mm() function in mm/swapfile.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102059
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53171
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the get_znodes_to_commit() function in fs/ubifs/tnc_commit.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53190
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the efuse_write_1byte() and read_efuse_byte() functions in drivers/net/wireless/realtek/rtlwifi/efuse.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53237
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102070
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53239
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102216
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56567
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56595
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56597
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102024
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56631
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102025
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56633
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56662
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dtl_worker_enable() and dtl_worker_disable() functions in arch/powerpc/platforms/pseries/lpar.c, within the dtl_enable() and dtl_disable() functions in arch/powerpc/platforms/pseries/dtl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102393
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56759
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-246.0.0.148
python3-perf: before 5.10.0-246.0.0.148
perf-debuginfo: before 5.10.0-246.0.0.148
perf: before 5.10.0-246.0.0.148
kernel-tools-devel: before 5.10.0-246.0.0.148
kernel-tools-debuginfo: before 5.10.0-246.0.0.148
kernel-tools: before 5.10.0-246.0.0.148
kernel-source: before 5.10.0-246.0.0.148
kernel-headers: before 5.10.0-246.0.0.148
kernel-devel: before 5.10.0-246.0.0.148
kernel-debugsource: before 5.10.0-246.0.0.148
kernel-debuginfo: before 5.10.0-246.0.0.148
kernel: before 5.10.0-246.0.0.148
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1066
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.