Risk | Low |
Patch available | YES |
Number of vulnerabilities | 176 |
CVE-ID | CVE-2023-53034 CVE-2024-41935 CVE-2024-49980 CVE-2024-52559 CVE-2024-52560 CVE-2024-53162 CVE-2024-53174 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53179 CVE-2024-53181 CVE-2024-53210 CVE-2024-53216 CVE-2024-53233 CVE-2024-53680 CVE-2024-54458 CVE-2024-55881 CVE-2024-56533 CVE-2024-56545 CVE-2024-56558 CVE-2024-56566 CVE-2024-56573 CVE-2024-56574 CVE-2024-56576 CVE-2024-56577 CVE-2024-56579 CVE-2024-56587 CVE-2024-56593 CVE-2024-56600 CVE-2024-56602 CVE-2024-56616 CVE-2024-56625 CVE-2024-56628 CVE-2024-56635 CVE-2024-56636 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56651 CVE-2024-56664 CVE-2024-56678 CVE-2024-56689 CVE-2024-56694 CVE-2024-56707 CVE-2024-56710 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56727 CVE-2024-56751 CVE-2024-56754 CVE-2024-56774 CVE-2024-57795 CVE-2024-57857 CVE-2024-57908 CVE-2024-57911 CVE-2024-57912 CVE-2024-57929 CVE-2024-57952 CVE-2024-57996 CVE-2024-57999 CVE-2024-58002 CVE-2024-58003 CVE-2024-58007 CVE-2024-58009 CVE-2024-58011 CVE-2024-58013 CVE-2024-58014 CVE-2024-58016 CVE-2024-58017 CVE-2024-58076 CVE-2024-58079 CVE-2024-58083 CVE-2024-58086 CVE-2024-58088 CVE-2024-58090 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21640 CVE-2025-21665 CVE-2025-21666 CVE-2025-21669 CVE-2025-21675 CVE-2025-21690 CVE-2025-21692 CVE-2025-21697 CVE-2025-21700 CVE-2025-21701 CVE-2025-21709 CVE-2025-21712 CVE-2025-21721 CVE-2025-21735 CVE-2025-21739 CVE-2025-21741 CVE-2025-21742 CVE-2025-21744 CVE-2025-21746 CVE-2025-21748 CVE-2025-21749 CVE-2025-21753 CVE-2025-21758 CVE-2025-21759 CVE-2025-21760 CVE-2025-21761 CVE-2025-21762 CVE-2025-21763 CVE-2025-21764 CVE-2025-21765 CVE-2025-21766 CVE-2025-21772 CVE-2025-21773 CVE-2025-21775 CVE-2025-21779 CVE-2025-21780 CVE-2025-21781 CVE-2025-21784 CVE-2025-21790 CVE-2025-21792 CVE-2025-21793 CVE-2025-21821 CVE-2025-21826 CVE-2025-21830 CVE-2025-21831 CVE-2025-21835 CVE-2025-21836 CVE-2025-21838 CVE-2025-21847 CVE-2025-21848 CVE-2025-21855 CVE-2025-21857 CVE-2025-21858 CVE-2025-21859 CVE-2025-21862 CVE-2025-21866 CVE-2025-21867 CVE-2025-21870 CVE-2025-21871 CVE-2025-21873 CVE-2025-21877 CVE-2025-21878 CVE-2025-21881 CVE-2025-21883 CVE-2025-21885 CVE-2025-21888 CVE-2025-21892 CVE-2025-21895 CVE-2025-21898 CVE-2025-21899 CVE-2025-21910 CVE-2025-21914 CVE-2025-21923 CVE-2025-21927 CVE-2025-21928 CVE-2025-21935 CVE-2025-21941 CVE-2025-21943 CVE-2025-21946 CVE-2025-21949 CVE-2025-21963 CVE-2025-21964 CVE-2025-21976 CVE-2025-21978 CVE-2025-21993 CVE-2025-21994 CVE-2025-21999 CVE-2025-22008 CVE-2025-22013 CVE-2025-22035 CVE-2025-22038 CVE-2025-22049 CVE-2025-22066 CVE-2025-22120 CVE-2025-23136 CVE-2025-38240 |
CWE-ID | CWE-125 CWE-20 CWE-667 CWE-190 CWE-416 CWE-401 CWE-399 CWE-388 CWE-476 CWE-415 CWE-191 CWE-119 CWE-835 CWE-908 CWE-665 CWE-369 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 176 vulnerabilities.
EUVDB-ID: #VU107691
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53034
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the switchtec_ntb_mw_set_trans() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41935
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __grab_extent_tree(), __destroy_extent_node(), __update_extent_tree_range(), write_unlock(), __shrink_extent_tree(), f2fs_shrink_age_extent_tree(), f2fs_destroy_extent_node() and __drop_extent_tree() functions in fs/f2fs/extent_cache.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99014
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49980
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vrf_finish_direct() function in drivers/net/vrf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105046
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-52559
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the msm_ioctl_gem_submit() function in drivers/gpu/drm/msm/msm_gem_submit.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-52560
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the compare_attr(), mi_new_attt_id(), mi_enum_attr(), mi_format_new() and mi_insert_attr() functions in fs/ntfs3/record.c, within the ni_std(), ni_std5(), ni_find_attr(), ni_enum_attr_ex(), ni_load_attr(), ni_remove_attr(), al_remove_le(), ni_ins_new_attr(), ni_try_remove_attr_list(), ni_create_attr_list(), ni_ins_attr_ext(), ni_insert_attr(), ni_expand_mft_list(), ni_expand_list() and ni_write_inode() functions in fs/ntfs3/frecord.c, within the mi_find_attr() and attr_collapse_range() functions in fs/ntfs3/attrib.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53162
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the uof_get_name() function in drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53174
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the c_show() function in net/sunrpc/cache.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102174
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53176
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cifs_dentry_needs_reval() function in fs/smb/client/inode.c, within the init_cifs() and cifs_destroy_netfs() functions in fs/smb/client/cifsfs.c, within the free_cached_dir(), close_all_cached_dirs(), invalidate_all_cached_dirs(), cached_dir_lease_break(), init_cached_dir(), cfids_laundromat_worker(), init_cached_dirs() and free_cached_dirs() functions in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102056
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53177
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SMB2_query_info_free(), invalidate_all_cached_dirs(), smb2_cached_lease_break(), cached_dir_lease_break() and cfids_laundromat_worker() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53178
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the find_or_create_cached_dir() and smb2_set_related() functions in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102054
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53179
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102231
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53181
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vector_device_release() function in arch/um/drivers/vector_kern.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53210
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102356
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53216
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in fs/nfsd/export.c. A local user can execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53233
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the utf8_load() function in fs/unicode/utf8-core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53680
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ip_vs_protocol_net_cleanup() and ip_vs_protocol_init() functions in net/netfilter/ipvs/ip_vs_proto.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104956
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54458
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ufs_bsg_remove() function in drivers/ufs/core/ufs_bsg.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102984
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-55881
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the complete_hypercall_exit() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56533
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_usx2y_disconnect() function in sound/usb/usx2y/usbusx2y.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102253
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56545
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mousevsc_hid_raw_request(), HID_DEVICE(), mousevsc_probe() and mousevsc_init() functions in drivers/hid/hid-hyperv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102042
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56558
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the e_show() function in fs/nfsd/export.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102170
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56566
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the check_slab(), slab_fix() and alloc_single_from_partial() functions in mm/slub.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56573
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the efi_handle_cmdline() function in drivers/firmware/efi/libstub/efi-stub.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102125
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56574
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ts2020_regmap_unlock() function in drivers/media/dvb-frontends/ts2020.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56576
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56577
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtk_jpegdec_hw_init_irq() and mtk_jpegdec_hw_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_dec_hw.c, within the mtk_jpeg_single_core_init() and mtk_jpeg_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56579
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the vpu_add_func() function in drivers/media/platform/amphion/vpu_v4l2.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102104
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56587
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brightness_show() and max_brightness_show() functions in drivers/leds/led-class.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102107
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56593
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcmf_sdiod_sgtable_alloc() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/bcmsdh.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102016
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56600
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the htons() function in net/ipv6/af_inet6.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102017
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56602
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ieee802154_create() function in net/ieee802154/socket.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56616
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drm_dp_decode_sideband_msg_hdr() function in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56625
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the can_set_termination() function in drivers/net/can/dev/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56628
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the arch/loongarch/include/asm/hugetlb.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102026
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56635
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the default_operstate() function in net/core/link_watch.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102245
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56636
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the geneve_xmit_skb() function in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101989
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56643
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dccp_feat_change_recv() function in net/dccp/feat.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101992
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56644
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ip6_negative_advice() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102210
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56645
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the j1939_session_new() function in net/can/j1939/transport.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102030
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56651
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102034
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56664
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_map_lookup_sys() function in net/core/sock_map.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102012
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56678
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ___do_page_fault() function in arch/powerpc/mm/fault.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102097
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56689
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pci_epf_mhi_bind() function in drivers/pci/endpoint/functions/pci-epf-mhi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102157
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56694
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sk_psock_strp_data_ready() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102275
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56707
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the otx2_dmacflt_do_add() and otx2_dmacflt_update() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_dmac_flt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101988
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56710
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __ceph_sync_read() and ceph_direct_read_write() functions in fs/ceph/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102225
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56723
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56724
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bxt_wcove_tmu_irq_handler() and bxt_wcove_tmu_probe() functions in drivers/platform/x86/intel/bxtwc_tmu.c, within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56725
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the otx2_config_priority_flow_ctrl() function in drivers/net/ethernet/marvell/octeontx2/nic/otx2_dcbnl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102271
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56727
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the otx2_alloc_mcam_entries() and otx2_mcam_entry_init() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_flows.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56751
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip6_dst_ifdown(), DEFINE_SPINLOCK() and rt6_remove_exception() functions in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102273
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56754
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the caam_qi_init() function in drivers/crypto/caam/qi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102483
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56774
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btrfs_search_slot() function in fs/btrfs/ctree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102906
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57795
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rxe_query_port(), rxe_enable_driver(), INIT_RDMA_OBJ_SIZE() and rxe_register_device() functions in drivers/infiniband/sw/rxe/rxe_verbs.c, within the rxe_parent_name(), rxe_net_add() and rxe_port_down() functions in drivers/infiniband/sw/rxe/rxe_net.c, within the rxe_mcast_add() function in drivers/infiniband/sw/rxe/rxe_mcast.c, within the rxe_dealloc(), rxe_init_device_param(), rxe_init_port_param() and rxe_set_mtu() functions in drivers/infiniband/sw/rxe/rxe.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102910
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57857
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the siw_query_device(), siw_query_port() and siw_query_qp() functions in drivers/infiniband/sw/siw/siw_verbs.c, within the siw_device_create(), siw_netdev_event() and siw_newlink() functions in drivers/infiniband/sw/siw/siw_main.c, within the siw_create_listen() and siw_cep_set_free_and_put() functions in drivers/infiniband/sw/siw/siw_cm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57908
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the kmx61_trigger_handler() function in drivers/iio/imu/kmx61.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57911
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iio_simple_dummy_trigger_h() function in drivers/iio/dummy/iio_simple_dummy_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57912
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the zpa2326_fill_sample_buffer() function in drivers/iio/pressure/zpa2326.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57929
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the load_ablock() function in drivers/md/persistent-data/dm-array.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103924
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57952
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the simple_offset_destroy(), offset_dir_open(), offset_dir_llseek(), offset_dir_emit() and offset_iterate_dir() functions in fs/libfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57996
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sfq_change() function in net/sched/sch_sfq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105029
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57999
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the enable_ddw() and spapr_tce_create_table() functions in arch/powerpc/platforms/pseries/iommu.c, within the iommu_table_clear() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105071
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58002
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the uvc_v4l2_release() function in drivers/media/usb/uvc/uvc_v4l2.c, within the uvc_ctrl_send_slave_event(), uvc_ctrl_status_event(), uvc_ctrl_commit_entity() and uvc_ctrl_init_device() functions in drivers/media/usb/uvc/uvc_ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58003
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ub953_subdev_uninit() function in drivers/media/i2c/ds90ub953.c, within the ub913_subdev_uninit() function in drivers/media/i2c/ds90ub913.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104973
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58007
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qcom_socinfo_probe() function in drivers/soc/qcom/socinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58009
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58011
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the skl_int3472_tps68470_probe() function in drivers/platform/x86/intel/int3472/tps68470.c, within the skl_int3472_discrete_probe() function in drivers/platform/x86/intel/int3472/discrete.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104958
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58013
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mgmt_remove_adv_monitor_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104974
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58014
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the wlc_phy_iqcal_gainparams_nphy() function in drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_n.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105073
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58016
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the handle_policy_update() function in security/safesetid/securityfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105048
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58017
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the __alignof__() function in kernel/printk/printk.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58076
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/gcc-sm6350.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105390
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58079
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uvc_gpio_parse() and uvc_unregister_video() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105391
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58083
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the include/linux/kvm_host.h. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105431
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58086
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the v3d_perfmon_destroy_ioctl() function in drivers/gpu/drm/v3d/v3d_perfmon.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105657
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58088
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cgroup_storage_map_alloc() function in kernel/bpf/bpf_cgrp_storage.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58090
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the !defined() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103023
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21636
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_udp_port() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103024
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21637
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_auth() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103025
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21638
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_alpha_beta() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21640
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103594
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21665
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the folio_seek_hole_data() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103513
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21666
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and vsock_connectible_has_data() functions in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103583
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21669
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the virtio_transport_recv_pkt() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103585
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21675
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_lag_port_sel_create() and mlx5_destroy_ttc_table() functions in drivers/net/ethernet/mellanox/mlx5/core/lag/port_sel.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103751
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21690
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dev_warn() and storvsc_on_io_completion() functions in drivers/scsi/storvsc_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103743
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21692
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ets_class_from_arg() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103920
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21697
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the v3d_irq() and v3d_hub_irq() functions in drivers/gpu/drm/v3d/v3d_irq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103959
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21700
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103960
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105043
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21709
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mt_set_in_rcu() function in kernel/fork.c, within the register_for_each_vma() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105061
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21712
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the md_seq_show() function in drivers/md/md.c, within the bitmap_get_stats() function in drivers/md/md-bitmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105036
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21721
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nilfs_rename() function in fs/nilfs2/namei.c, within the nilfs_inode_by_name(), nilfs_set_link() and nilfs_delete_entry() functions in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105056
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21735
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the nci_hci_create_pipe() function in net/nfc/nci/hci.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104935
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21739
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ufshcd_pltfrm_init() and ufshcd_pltfrm_remove() functions in drivers/ufs/host/ufshcd-pltfrm.c, within the ufshcd_pci_remove() and ufshcd_pci_probe() functions in drivers/ufs/host/ufshcd-pci.c, within the EXPORT_SYMBOL_GPL(), ufshcd_set_dma_mask() and ufshcd_alloc_host() functions in drivers/ufs/core/ufshcd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104977
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21741
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21742
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105000
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21744
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcmf_txfinalize() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105032
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21746
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the synaptics_pt_stop(), synaptics_pt_create() and synaptics_process_byte() functions in drivers/input/mouse/synaptics.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105050
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21748
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the ksmbd_ipc_spnego_authen_request(), ksmbd_rpc_write() and ksmbd_rpc_ioctl() functions in fs/smb/server/transport_ipc.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105019
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21749
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rose_bind() function in net/rose/af_rose.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104944
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21753
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/btrfs/transaction.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21758
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104946
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21759
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mld_send_cr() and igmp6_send() functions in net/ipv6/mcast.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104947
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21760
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ip6_nd_hdr() and ndisc_send_skb() functions in net/ipv6/ndisc.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104948
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21761
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ovs_vport_cmd_fill_info() function in net/openvswitch/datapath.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104949
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21762
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the arp_xmit_finish() function in net/ipv4/arp.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104943
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21763
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __neigh_notify() function in net/core/neighbour.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104950
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21764
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ndisc_alloc_skb() function in net/ipv6/ndisc.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105090
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21765
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ip6_default_advmss() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105089
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21766
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the out: kfree_skb_reason() and __ip_rt_update_pmtu() functions in net/ipv4/route.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21772
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mac_partition() function in block/partitions/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104998
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21773
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the es58x_devlink_info_get() function in drivers/net/can/usb/etas_es58x/es58x_devlink.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21775
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ctucan_err_interrupt() function in drivers/net/can/ctucanfd/ctucanfd_base.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104994
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21779
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the kvm_hv_send_ipi() and kvm_get_hv_cpuid() functions in arch/x86/kvm/hyperv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21780
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the smu_sys_set_pp_table() function in drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21781
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the batadv_v_elp_start_timer() and batadv_v_elp_get_throughput() functions in net/batman-adv/bat_v_elp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21784
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the psp_init_cap_microcode() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21790
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vxlan_init() function in drivers/net/vxlan/vxlan_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104942
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21792
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_setsockopt() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105059
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21793
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the f_ospi_get_dummy_cycle() function in drivers/spi/spi-sn-f-ospi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21821
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the omap_init_lcd_dma() function in drivers/video/fbdev/omap/lcd_dma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105421
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21826
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nft_set_desc_concat_parse() and nft_set_desc_concat() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105425
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21830
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the get_mode_access() function in security/landlock/fs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105432
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21831
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the DECLARE_PCI_FIXUP_SUSPEND() function in arch/x86/pci/fixup.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105465
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21835
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the f_midi_bind() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105472
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21836
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the io_destroy_buffers() and io_register_pbuf_ring() functions in io_uring/kbuf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21838
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the usb_del_gadget() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105661
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21847
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sof_ipc_msg_data() function in sound/soc/sof/stream-ipc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105662
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21848
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nfp_bpf_cmsg_alloc() function in drivers/net/ethernet/netronome/nfp/bpf/cmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105652
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ibmvnic_xmit() and netif_stop_subqueue() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105666
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21857
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tcf_exts_miss_cookie_base_alloc() function in net/sched/cls_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105654
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21858
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the geneve_destroy_tunnels() function in drivers/net/geneve.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105669
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21859
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the f_midi_complete() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105670
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21862
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the init_net_drop_monitor() and exit_net_drop_monitor() functions in net/core/drop_monitor.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105656
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21866
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the text_area_cpu_up() function in arch/powerpc/lib/code-patching.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106112
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21867
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bpf_test_init() function in net/bpf/test_run.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21870
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sof_ipc4_widget_setup_comp_dai() and sof_ipc4_prepare_copier_module() functions in sound/soc/sof/ipc4-topology.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106122
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21871
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the optee_supp_thrd_req() function in drivers/tee/optee/supp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21873
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ufshcd_rpm_put_sync() function in drivers/ufs/core/ufs_bsg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21877
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106117
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21878
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the npcm_i2c_probe_bus() function in drivers/i2c/busses/i2c-npcm7xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106124
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21881
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106109
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21883
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ice_initialize_vf_entry() function in drivers/net/ethernet/intel/ice/ice_vf_lib.c, within the ice_free_vf_entries() and ice_free_vfs() functions in drivers/net/ethernet/intel/ice/ice_sriov.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21885
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106111
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21888
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlx5_free_priv_descs() function in drivers/infiniband/hw/mlx5/mr.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21892
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mlx5r_umr_cleanup(), mlx5r_umr_recover() and mlx5r_umr_post_send_wait() functions in drivers/infiniband/hw/mlx5/umr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106855
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21895
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the find_get_pmu_context() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106846
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21898
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the function_stat_show() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106811
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21899
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the event_hist_trigger_parse() function in kernel/trace/trace_events_hist.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106800
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21910
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the is_an_alpha2() function in net/wireless/reg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106585
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21914
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the slim_do_transfer() function in drivers/slimbus/messaging.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106594
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21923
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the steam_remove() function in drivers/hid/hid-steam.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106844
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21927
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the nvme_tcp_queue_id() and nvme_tcp_recv_pdu() functions in drivers/nvme/host/tcp.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106598
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21928
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ishtp_hid_remove() function in drivers/hid/intel-ish-hid/ishtp-hid.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106611
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21935
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rio_scan_alloc_net() function in drivers/rapidio/rio-scan.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106704
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21941
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the resource_build_scaling_params() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106768
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21943
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the new_device_store(), kfree() and delete_device_store() functions in drivers/gpio/gpio-aggregator.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106656
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21946
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the parse_sid() and parse_sec_desc() functions in fs/smb/server/smbacl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106830
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21949
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the arch_get_unmapped_area_common() function in arch/loongarch/mm/mmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21963
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21964
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106862
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21976
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hvfb_putmem(), hvfb_ops_damage_area(), hvfb_probe() and hvfb_remove() functions in drivers/video/fbdev/hyperv_fb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106573
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21978
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the hyperv_vmbus_probe() and hyperv_vmbus_remove() functions in drivers/gpu/drm/hyperv/hyperv_drm_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106651
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21993
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ibft_attr_show_nic() function in drivers/firmware/iscsi_ibft.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106864
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21994
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the parse_dacl() function in fs/smb/server/smbacl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106955
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21999
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the proc_get_inode() function in fs/proc/inode.c, within the proc_create_reg(), proc_create_seq_private() and proc_create_single_data() functions in fs/proc/generic.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107813
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22008
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the regulator_resolve_supply() and _regulator_get_common() functions in drivers/regulator/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107787
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22013
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the kvm_arch_vcpu_load_fp() function in arch/arm64/kvm/fpsimd.c, within the fpsimd_signal_preserve_current_state() function in arch/arm64/kernel/fpsimd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107675
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22035
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the wakeup_trace_open() function in kernel/trace/trace_sched_wakeup.c, within the irqsoff_trace_open() function in kernel/trace/trace_irqsoff.c, within the graph_trace_close() function in kernel/trace/trace_functions_graph.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107694
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22038
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sid_to_id() function in fs/smb/server/smbacl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107768
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22049
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the arch/loongarch/include/asm/cache.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107714
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22066
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the imx_card_probe() function in sound/soc/fsl/imx-card.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107796
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22120
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_setattr() function in fs/ext4/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107703
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23136
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the int3402_thermal_probe() function in drivers/thermal/intel/int340x_thermal/int3402_thermal.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107696
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38240
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtk_dp_parse_capabilities() and mtk_dp_wait_hpd_asserted() functions in drivers/gpu/drm/mediatek/mtk_dp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-87.0.0.82
python3-perf: before 6.6.0-87.0.0.82
perf-debuginfo: before 6.6.0-87.0.0.82
perf: before 6.6.0-87.0.0.82
kernel-tools-devel: before 6.6.0-87.0.0.82
kernel-tools-debuginfo: before 6.6.0-87.0.0.82
kernel-tools: before 6.6.0-87.0.0.82
kernel-source: before 6.6.0-87.0.0.82
kernel-headers: before 6.6.0-87.0.0.82
kernel-devel: before 6.6.0-87.0.0.82
kernel-debugsource: before 6.6.0-87.0.0.82
kernel-debuginfo: before 6.6.0-87.0.0.82
bpftool-debuginfo: before 6.6.0-87.0.0.82
bpftool: before 6.6.0-87.0.0.82
kernel: before 6.6.0-87.0.0.82
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.