openEuler 24.03 LTS update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 176
CVE-ID CVE-2023-53034
CVE-2024-41935
CVE-2024-49980
CVE-2024-52559
CVE-2024-52560
CVE-2024-53162
CVE-2024-53174
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53179
CVE-2024-53181
CVE-2024-53210
CVE-2024-53216
CVE-2024-53233
CVE-2024-53680
CVE-2024-54458
CVE-2024-55881
CVE-2024-56533
CVE-2024-56545
CVE-2024-56558
CVE-2024-56566
CVE-2024-56573
CVE-2024-56574
CVE-2024-56576
CVE-2024-56577
CVE-2024-56579
CVE-2024-56587
CVE-2024-56593
CVE-2024-56600
CVE-2024-56602
CVE-2024-56616
CVE-2024-56625
CVE-2024-56628
CVE-2024-56635
CVE-2024-56636
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56651
CVE-2024-56664
CVE-2024-56678
CVE-2024-56689
CVE-2024-56694
CVE-2024-56707
CVE-2024-56710
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56727
CVE-2024-56751
CVE-2024-56754
CVE-2024-56774
CVE-2024-57795
CVE-2024-57857
CVE-2024-57908
CVE-2024-57911
CVE-2024-57912
CVE-2024-57929
CVE-2024-57952
CVE-2024-57996
CVE-2024-57999
CVE-2024-58002
CVE-2024-58003
CVE-2024-58007
CVE-2024-58009
CVE-2024-58011
CVE-2024-58013
CVE-2024-58014
CVE-2024-58016
CVE-2024-58017
CVE-2024-58076
CVE-2024-58079
CVE-2024-58083
CVE-2024-58086
CVE-2024-58088
CVE-2024-58090
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21640
CVE-2025-21665
CVE-2025-21666
CVE-2025-21669
CVE-2025-21675
CVE-2025-21690
CVE-2025-21692
CVE-2025-21697
CVE-2025-21700
CVE-2025-21701
CVE-2025-21709
CVE-2025-21712
CVE-2025-21721
CVE-2025-21735
CVE-2025-21739
CVE-2025-21741
CVE-2025-21742
CVE-2025-21744
CVE-2025-21746
CVE-2025-21748
CVE-2025-21749
CVE-2025-21753
CVE-2025-21758
CVE-2025-21759
CVE-2025-21760
CVE-2025-21761
CVE-2025-21762
CVE-2025-21763
CVE-2025-21764
CVE-2025-21765
CVE-2025-21766
CVE-2025-21772
CVE-2025-21773
CVE-2025-21775
CVE-2025-21779
CVE-2025-21780
CVE-2025-21781
CVE-2025-21784
CVE-2025-21790
CVE-2025-21792
CVE-2025-21793
CVE-2025-21821
CVE-2025-21826
CVE-2025-21830
CVE-2025-21831
CVE-2025-21835
CVE-2025-21836
CVE-2025-21838
CVE-2025-21847
CVE-2025-21848
CVE-2025-21855
CVE-2025-21857
CVE-2025-21858
CVE-2025-21859
CVE-2025-21862
CVE-2025-21866
CVE-2025-21867
CVE-2025-21870
CVE-2025-21871
CVE-2025-21873
CVE-2025-21877
CVE-2025-21878
CVE-2025-21881
CVE-2025-21883
CVE-2025-21885
CVE-2025-21888
CVE-2025-21892
CVE-2025-21895
CVE-2025-21898
CVE-2025-21899
CVE-2025-21910
CVE-2025-21914
CVE-2025-21923
CVE-2025-21927
CVE-2025-21928
CVE-2025-21935
CVE-2025-21941
CVE-2025-21943
CVE-2025-21946
CVE-2025-21949
CVE-2025-21963
CVE-2025-21964
CVE-2025-21976
CVE-2025-21978
CVE-2025-21993
CVE-2025-21994
CVE-2025-21999
CVE-2025-22008
CVE-2025-22013
CVE-2025-22035
CVE-2025-22038
CVE-2025-22049
CVE-2025-22066
CVE-2025-22120
CVE-2025-23136
CVE-2025-38240
CWE-ID CWE-125
CWE-20
CWE-667
CWE-190
CWE-416
CWE-401
CWE-399
CWE-388
CWE-476
CWE-415
CWE-191
CWE-119
CWE-835
CWE-908
CWE-665
CWE-369
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 176 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU107691

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53034

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the switchtec_ntb_mw_set_trans() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU102995

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41935

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __grab_extent_tree(), __destroy_extent_node(), __update_extent_tree_range(), write_unlock(), __shrink_extent_tree(), f2fs_shrink_age_extent_tree(), f2fs_destroy_extent_node() and __drop_extent_tree() functions in fs/f2fs/extent_cache.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU99014

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49980

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vrf_finish_direct() function in drivers/net/vrf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Integer overflow

EUVDB-ID: #VU105046

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-52559

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the msm_ioctl_gem_submit() function in drivers/gpu/drm/msm/msm_gem_submit.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU105086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-52560

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the compare_attr(), mi_new_attt_id(), mi_enum_attr(), mi_format_new() and mi_insert_attr() functions in fs/ntfs3/record.c, within the ni_std(), ni_std5(), ni_find_attr(), ni_enum_attr_ex(), ni_load_attr(), ni_remove_attr(), al_remove_le(), ni_ins_new_attr(), ni_try_remove_attr_list(), ni_create_attr_list(), ni_ins_attr_ext(), ni_insert_attr(), ni_expand_mft_list(), ni_expand_list() and ni_write_inode() functions in fs/ntfs3/frecord.c, within the mi_find_attr() and attr_collapse_range() functions in fs/ntfs3/attrib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU101912

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53162

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the uof_get_name() function in drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU102057

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53174

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the c_show() function in net/sunrpc/cache.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper locking

EUVDB-ID: #VU102174

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53176

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cifs_dentry_needs_reval() function in fs/smb/client/inode.c, within the init_cifs() and cifs_destroy_netfs() functions in fs/smb/client/cifsfs.c, within the free_cached_dir(), close_all_cached_dirs(), invalidate_all_cached_dirs(), cached_dir_lease_break(), init_cached_dir(), cfids_laundromat_worker(), init_cached_dirs() and free_cached_dirs() functions in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU102056

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53177

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SMB2_query_info_free(), invalidate_all_cached_dirs(), smb2_cached_lease_break(), cached_dir_lease_break() and cfids_laundromat_worker() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Memory leak

EUVDB-ID: #VU102007

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53178

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the find_or_create_cached_dir() and smb2_set_related() functions in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU102054

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53179

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Resource management error

EUVDB-ID: #VU102231

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53181

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vector_device_release() function in arch/um/drivers/vector_kern.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU102004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53210

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU102356

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53216

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in fs/nfsd/export.c. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper error handling

EUVDB-ID: #VU102207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53233

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the utf8_load() function in fs/unicode/utf8-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU102928

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53680

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ip_vs_protocol_net_cleanup() and ip_vs_protocol_init() functions in net/netfilter/ipvs/ip_vs_proto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU104956

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54458

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ufs_bsg_remove() function in drivers/ufs/core/ufs_bsg.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Resource management error

EUVDB-ID: #VU102984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-55881

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the complete_hypercall_exit() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Improper locking

EUVDB-ID: #VU102182

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56533

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_usx2y_disconnect() function in sound/usb/usx2y/usbusx2y.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Resource management error

EUVDB-ID: #VU102253

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56545

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the mousevsc_hid_raw_request(), HID_DEVICE(), mousevsc_probe() and mousevsc_init() functions in drivers/hid/hid-hyperv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU102042

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56558

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the e_show() function in fs/nfsd/export.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper locking

EUVDB-ID: #VU102170

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56566

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the check_slab(), slab_fix() and alloc_single_from_partial() functions in mm/slub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Double free

EUVDB-ID: #VU102193

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56573

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the efi_handle_cmdline() function in drivers/firmware/efi/libstub/efi-stub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) NULL pointer dereference

EUVDB-ID: #VU102125

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56574

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ts2020_regmap_unlock() function in drivers/media/dvb-frontends/ts2020.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Resource management error

EUVDB-ID: #VU102229

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56576

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) NULL pointer dereference

EUVDB-ID: #VU102123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56577

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_jpegdec_hw_init_irq() and mtk_jpegdec_hw_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_dec_hw.c, within the mtk_jpeg_single_core_init() and mtk_jpeg_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Improper error handling

EUVDB-ID: #VU102205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56579

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the vpu_add_func() function in drivers/media/platform/amphion/vpu_v4l2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) NULL pointer dereference

EUVDB-ID: #VU102104

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56587

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brightness_show() and max_brightness_show() functions in drivers/leds/led-class.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) NULL pointer dereference

EUVDB-ID: #VU102107

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56593

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brcmf_sdiod_sgtable_alloc() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/bcmsdh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use-after-free

EUVDB-ID: #VU102016

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56600

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the htons() function in net/ipv6/af_inet6.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Use-after-free

EUVDB-ID: #VU102017

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56602

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ieee802154_create() function in net/ieee802154/socket.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Out-of-bounds read

EUVDB-ID: #VU102082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56616

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drm_dp_decode_sideband_msg_hdr() function in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Resource management error

EUVDB-ID: #VU102244

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56625

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the can_set_termination() function in drivers/net/can/dev/dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Improper locking

EUVDB-ID: #VU102162

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56628

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the arch/loongarch/include/asm/hugetlb.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Use-after-free

EUVDB-ID: #VU102026

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56635

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the default_operstate() function in net/core/link_watch.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Resource management error

EUVDB-ID: #VU102245

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56636

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the geneve_xmit_skb() function in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Memory leak

EUVDB-ID: #VU101989

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56643

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dccp_feat_change_recv() function in net/dccp/feat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Memory leak

EUVDB-ID: #VU101992

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56644

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ip6_negative_advice() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Integer underflow

EUVDB-ID: #VU102210

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56645

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the j1939_session_new() function in net/can/j1939/transport.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Use-after-free

EUVDB-ID: #VU102030

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56651

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use-after-free

EUVDB-ID: #VU102034

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56664

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sock_map_lookup_sys() function in net/core/sock_map.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Use-after-free

EUVDB-ID: #VU102012

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56678

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ___do_page_fault() function in arch/powerpc/mm/fault.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) NULL pointer dereference

EUVDB-ID: #VU102097

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56689

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pci_epf_mhi_bind() function in drivers/pci/endpoint/functions/pci-epf-mhi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Improper locking

EUVDB-ID: #VU102157

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56694

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sk_psock_strp_data_ready() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Input validation error

EUVDB-ID: #VU102275

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56707

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the otx2_dmacflt_do_add() and otx2_dmacflt_update() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_dmac_flt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory leak

EUVDB-ID: #VU101988

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56710

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __ceph_sync_read() and ceph_direct_read_write() functions in fs/ceph/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Resource management error

EUVDB-ID: #VU102225

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56723

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Resource management error

EUVDB-ID: #VU102224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56724

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bxt_wcove_tmu_irq_handler() and bxt_wcove_tmu_probe() functions in drivers/platform/x86/intel/bxtwc_tmu.c, within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Input validation error

EUVDB-ID: #VU102269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56725

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the otx2_config_priority_flow_ctrl() function in drivers/net/ethernet/marvell/octeontx2/nic/otx2_dcbnl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Input validation error

EUVDB-ID: #VU102271

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56727

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the otx2_alloc_mcam_entries() and otx2_mcam_entry_init() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_flows.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Improper locking

EUVDB-ID: #VU102152

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56751

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ip6_dst_ifdown(), DEFINE_SPINLOCK() and rt6_remove_exception() functions in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Input validation error

EUVDB-ID: #VU102273

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56754

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the caam_qi_init() function in drivers/crypto/caam/qi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) NULL pointer dereference

EUVDB-ID: #VU102483

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56774

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the btrfs_search_slot() function in fs/btrfs/ctree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Use-after-free

EUVDB-ID: #VU102906

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57795

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rxe_query_port(), rxe_enable_driver(), INIT_RDMA_OBJ_SIZE() and rxe_register_device() functions in drivers/infiniband/sw/rxe/rxe_verbs.c, within the rxe_parent_name(), rxe_net_add() and rxe_port_down() functions in drivers/infiniband/sw/rxe/rxe_net.c, within the rxe_mcast_add() function in drivers/infiniband/sw/rxe/rxe_mcast.c, within the rxe_dealloc(), rxe_init_device_param(), rxe_init_port_param() and rxe_set_mtu() functions in drivers/infiniband/sw/rxe/rxe.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Use-after-free

EUVDB-ID: #VU102910

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57857

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the siw_query_device(), siw_query_port() and siw_query_qp() functions in drivers/infiniband/sw/siw/siw_verbs.c, within the siw_device_create(), siw_netdev_event() and siw_newlink() functions in drivers/infiniband/sw/siw/siw_main.c, within the siw_create_listen() and siw_cep_set_free_and_put() functions in drivers/infiniband/sw/siw/siw_cm.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Memory leak

EUVDB-ID: #VU103004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57908

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the kmx61_trigger_handler() function in drivers/iio/imu/kmx61.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Memory leak

EUVDB-ID: #VU103007

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57911

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iio_simple_dummy_trigger_h() function in drivers/iio/dummy/iio_simple_dummy_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Memory leak

EUVDB-ID: #VU103008

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57912

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the zpa2326_fill_sample_buffer() function in drivers/iio/pressure/zpa2326.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) NULL pointer dereference

EUVDB-ID: #VU103021

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57929

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the load_ablock() function in drivers/md/persistent-data/dm-array.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Buffer overflow

EUVDB-ID: #VU103924

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57952

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the simple_offset_destroy(), offset_dir_open(), offset_dir_llseek(), offset_dir_emit() and offset_iterate_dir() functions in fs/libfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Out-of-bounds read

EUVDB-ID: #VU104987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57996

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sfq_change() function in net/sched/sch_sfq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Improper locking

EUVDB-ID: #VU105029

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57999

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the enable_ddw() and spapr_tce_create_table() functions in arch/powerpc/platforms/pseries/iommu.c, within the iommu_table_clear() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Resource management error

EUVDB-ID: #VU105071

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58002

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the uvc_v4l2_release() function in drivers/media/usb/uvc/uvc_v4l2.c, within the uvc_ctrl_send_slave_event(), uvc_ctrl_status_event(), uvc_ctrl_commit_entity() and uvc_ctrl_init_device() functions in drivers/media/usb/uvc/uvc_ctrl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Buffer overflow

EUVDB-ID: #VU105062

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58003

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ub953_subdev_uninit() function in drivers/media/i2c/ds90ub953.c, within the ub913_subdev_uninit() function in drivers/media/i2c/ds90ub913.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Out-of-bounds read

EUVDB-ID: #VU104973

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58007

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the qcom_socinfo_probe() function in drivers/soc/qcom/socinfo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) NULL pointer dereference

EUVDB-ID: #VU105007

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58009

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) NULL pointer dereference

EUVDB-ID: #VU105006

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58011

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the skl_int3472_tps68470_probe() function in drivers/platform/x86/intel/int3472/tps68470.c, within the skl_int3472_discrete_probe() function in drivers/platform/x86/intel/int3472/discrete.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Use-after-free

EUVDB-ID: #VU104958

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58013

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mgmt_remove_adv_monitor_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Out-of-bounds read

EUVDB-ID: #VU104974

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58014

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the wlc_phy_iqcal_gainparams_nphy() function in drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_n.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Resource management error

EUVDB-ID: #VU105073

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58016

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the handle_policy_update() function in security/safesetid/securityfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Integer overflow

EUVDB-ID: #VU105048

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58017

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the __alignof__() function in kernel/printk/printk.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) NULL pointer dereference

EUVDB-ID: #VU105400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58076

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/gcc-sm6350.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Use-after-free

EUVDB-ID: #VU105390

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58079

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uvc_gpio_parse() and uvc_unregister_video() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Use-after-free

EUVDB-ID: #VU105391

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58083

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the include/linux/kvm_host.h. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Input validation error

EUVDB-ID: #VU105431

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58086

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the v3d_perfmon_destroy_ioctl() function in drivers/gpu/drm/v3d/v3d_perfmon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) NULL pointer dereference

EUVDB-ID: #VU105657

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58088

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cgroup_storage_map_alloc() function in kernel/bpf/bpf_cgrp_storage.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Infinite loop

EUVDB-ID: #VU106127

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58090

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the !defined() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) NULL pointer dereference

EUVDB-ID: #VU103023

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21636

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_udp_port() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) NULL pointer dereference

EUVDB-ID: #VU103024

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21637

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_auth() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) NULL pointer dereference

EUVDB-ID: #VU103025

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21638

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_alpha_beta() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) NULL pointer dereference

EUVDB-ID: #VU103027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21640

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Infinite loop

EUVDB-ID: #VU103594

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21665

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the folio_seek_hole_data() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) NULL pointer dereference

EUVDB-ID: #VU103513

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21666

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and vsock_connectible_has_data() functions in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) NULL pointer dereference

EUVDB-ID: #VU103583

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21669

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the virtio_transport_recv_pkt() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) NULL pointer dereference

EUVDB-ID: #VU103585

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21675

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_lag_port_sel_create() and mlx5_destroy_ttc_table() functions in drivers/net/ethernet/mellanox/mlx5/core/lag/port_sel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Resource management error

EUVDB-ID: #VU103751

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21690

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dev_warn() and storvsc_on_io_completion() functions in drivers/scsi/storvsc_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Out-of-bounds read

EUVDB-ID: #VU103743

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21692

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ets_class_from_arg() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) NULL pointer dereference

EUVDB-ID: #VU103920

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21697

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the v3d_irq() and v3d_hub_irq() functions in drivers/gpu/drm/v3d/v3d_irq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Use-after-free

EUVDB-ID: #VU103959

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21700

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Improper locking

EUVDB-ID: #VU103960

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21701

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Use of uninitialized resource

EUVDB-ID: #VU105043

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21709

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mt_set_in_rcu() function in kernel/fork.c, within the register_for_each_vma() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Improper Initialization

EUVDB-ID: #VU105061

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21712

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the md_seq_show() function in drivers/md/md.c, within the bitmap_get_stats() function in drivers/md/md-bitmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Input validation error

EUVDB-ID: #VU105036

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21721

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nilfs_rename() function in fs/nilfs2/namei.c, within the nilfs_inode_by_name(), nilfs_set_link() and nilfs_delete_entry() functions in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Buffer overflow

EUVDB-ID: #VU105056

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21735

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the nci_hci_create_pipe() function in net/nfc/nci/hci.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Memory leak

EUVDB-ID: #VU104935

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21739

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ufshcd_pltfrm_init() and ufshcd_pltfrm_remove() functions in drivers/ufs/host/ufshcd-pltfrm.c, within the ufshcd_pci_remove() and ufshcd_pci_probe() functions in drivers/ufs/host/ufshcd-pci.c, within the EXPORT_SYMBOL_GPL(), ufshcd_set_dma_mask() and ufshcd_alloc_host() functions in drivers/ufs/core/ufshcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Out-of-bounds read

EUVDB-ID: #VU104977

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21741

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Out-of-bounds read

EUVDB-ID: #VU104978

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21742

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) NULL pointer dereference

EUVDB-ID: #VU105000

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21744

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brcmf_txfinalize() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Input validation error

EUVDB-ID: #VU105032

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21746

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the synaptics_pt_stop(), synaptics_pt_create() and synaptics_process_byte() functions in drivers/input/mouse/synaptics.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Integer overflow

EUVDB-ID: #VU105050

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21748

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the ksmbd_ipc_spnego_authen_request(), ksmbd_rpc_write() and ksmbd_rpc_ioctl() functions in fs/smb/server/transport_ipc.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Improper locking

EUVDB-ID: #VU105019

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21749

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rose_bind() function in net/rose/af_rose.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Use-after-free

EUVDB-ID: #VU104944

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21753

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fs/btrfs/transaction.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Buffer overflow

EUVDB-ID: #VU105082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21758

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Use-after-free

EUVDB-ID: #VU104946

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21759

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mld_send_cr() and igmp6_send() functions in net/ipv6/mcast.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Use-after-free

EUVDB-ID: #VU104947

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21760

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ip6_nd_hdr() and ndisc_send_skb() functions in net/ipv6/ndisc.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Use-after-free

EUVDB-ID: #VU104948

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21761

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovs_vport_cmd_fill_info() function in net/openvswitch/datapath.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Use-after-free

EUVDB-ID: #VU104949

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21762

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the arp_xmit_finish() function in net/ipv4/arp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Use-after-free

EUVDB-ID: #VU104943

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21763

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __neigh_notify() function in net/core/neighbour.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Use-after-free

EUVDB-ID: #VU104950

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21764

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ndisc_alloc_skb() function in net/ipv6/ndisc.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Input validation error

EUVDB-ID: #VU105090

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21765

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ip6_default_advmss() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Input validation error

EUVDB-ID: #VU105089

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21766

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the out: kfree_skb_reason() and __ip_rt_update_pmtu() functions in net/ipv4/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Out-of-bounds read

EUVDB-ID: #VU104980

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21772

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mac_partition() function in block/partitions/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) NULL pointer dereference

EUVDB-ID: #VU104998

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21773

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the es58x_devlink_info_get() function in drivers/net/can/usb/etas_es58x/es58x_devlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) NULL pointer dereference

EUVDB-ID: #VU104996

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21775

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ctucan_err_interrupt() function in drivers/net/can/ctucanfd/ctucanfd_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) NULL pointer dereference

EUVDB-ID: #VU104994

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21779

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the kvm_hv_send_ipi() and kvm_get_hv_cpuid() functions in arch/x86/kvm/hyperv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Buffer overflow

EUVDB-ID: #VU105057

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21780

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the smu_sys_set_pp_table() function in drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Resource management error

EUVDB-ID: #VU105077

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21781

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the batadv_v_elp_start_timer() and batadv_v_elp_get_throughput() functions in net/batman-adv/bat_v_elp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Input validation error

EUVDB-ID: #VU105088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21784

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the psp_init_cap_microcode() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) NULL pointer dereference

EUVDB-ID: #VU104991

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21790

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vxlan_init() function in drivers/net/vxlan/vxlan_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Memory leak

EUVDB-ID: #VU104942

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21792

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ax25_setsockopt() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Division by zero

EUVDB-ID: #VU105059

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21793

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the f_ospi_get_dummy_cycle() function in drivers/spi/spi-sn-f-ospi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Resource management error

EUVDB-ID: #VU105158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21821

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the omap_init_lcd_dma() function in drivers/video/fbdev/omap/lcd_dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Buffer overflow

EUVDB-ID: #VU105421

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21826

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nft_set_desc_concat_parse() and nft_set_desc_concat() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Resource management error

EUVDB-ID: #VU105425

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21830

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the get_mode_access() function in security/landlock/fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Input validation error

EUVDB-ID: #VU105432

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21831

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the DECLARE_PCI_FIXUP_SUSPEND() function in arch/x86/pci/fixup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Memory leak

EUVDB-ID: #VU105465

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21835

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the f_midi_bind() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Buffer overflow

EUVDB-ID: #VU105472

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21836

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the io_destroy_buffers() and io_register_pbuf_ring() functions in io_uring/kbuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Input validation error

EUVDB-ID: #VU105473

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21838

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the usb_del_gadget() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) NULL pointer dereference

EUVDB-ID: #VU105661

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21847

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sof_ipc_msg_data() function in sound/soc/sof/stream-ipc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) NULL pointer dereference

EUVDB-ID: #VU105662

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21848

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nfp_bpf_cmsg_alloc() function in drivers/net/ethernet/netronome/nfp/bpf/cmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Use-after-free

EUVDB-ID: #VU105652

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21855

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ibmvnic_xmit() and netif_stop_subqueue() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) NULL pointer dereference

EUVDB-ID: #VU105666

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21857

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tcf_exts_miss_cookie_base_alloc() function in net/sched/cls_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Use-after-free

EUVDB-ID: #VU105654

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21858

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the geneve_destroy_tunnels() function in drivers/net/geneve.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Improper locking

EUVDB-ID: #VU105669

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21859

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the f_midi_complete() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Improper locking

EUVDB-ID: #VU105670

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21862

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the init_net_drop_monitor() and exit_net_drop_monitor() functions in net/core/drop_monitor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Out-of-bounds read

EUVDB-ID: #VU105656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21866

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the text_area_cpu_up() function in arch/powerpc/lib/code-patching.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Use-after-free

EUVDB-ID: #VU106112

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21867

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bpf_test_init() function in net/bpf/test_run.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) NULL pointer dereference

EUVDB-ID: #VU106114

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21870

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sof_ipc4_widget_setup_comp_dai() and sof_ipc4_prepare_copier_module() functions in sound/soc/sof/ipc4-topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Improper locking

EUVDB-ID: #VU106122

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21871

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the optee_supp_thrd_req() function in drivers/tee/optee/supp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Input validation error

EUVDB-ID: #VU106123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21873

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ufshcd_rpm_put_sync() function in drivers/ufs/core/ufs_bsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Resource management error

EUVDB-ID: #VU106132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21877

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Improper locking

EUVDB-ID: #VU106117

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21878

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the npcm_i2c_probe_bus() function in drivers/i2c/busses/i2c-npcm7xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Input validation error

EUVDB-ID: #VU106124

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21881

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Use-after-free

EUVDB-ID: #VU106109

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21883

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ice_initialize_vf_entry() function in drivers/net/ethernet/intel/ice/ice_vf_lib.c, within the ice_free_vf_entries() and ice_free_vfs() functions in drivers/net/ethernet/intel/ice/ice_sriov.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Improper locking

EUVDB-ID: #VU106118

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21885

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Use-after-free

EUVDB-ID: #VU106111

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21888

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5_free_priv_descs() function in drivers/infiniband/hw/mlx5/mr.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Improper locking

EUVDB-ID: #VU106121

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21892

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mlx5r_umr_cleanup(), mlx5r_umr_recover() and mlx5r_umr_post_send_wait() functions in drivers/infiniband/hw/mlx5/umr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) Resource management error

EUVDB-ID: #VU106855

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21895

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the find_get_pmu_context() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Division by zero

EUVDB-ID: #VU106846

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21898

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the function_stat_show() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Improper error handling

EUVDB-ID: #VU106811

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21899

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the event_hist_trigger_parse() function in kernel/trace/trace_events_hist.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Improper locking

EUVDB-ID: #VU106800

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21910

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the is_an_alpha2() function in net/wireless/reg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Use-after-free

EUVDB-ID: #VU106585

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21914

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the slim_do_transfer() function in drivers/slimbus/messaging.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Use-after-free

EUVDB-ID: #VU106594

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21923

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the steam_remove() function in drivers/hid/hid-steam.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Buffer overflow

EUVDB-ID: #VU106844

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21927

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the nvme_tcp_queue_id() and nvme_tcp_recv_pdu() functions in drivers/nvme/host/tcp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Use-after-free

EUVDB-ID: #VU106598

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21928

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ishtp_hid_remove() function in drivers/hid/intel-ish-hid/ishtp-hid.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Use-after-free

EUVDB-ID: #VU106611

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21935

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rio_scan_alloc_net() function in drivers/rapidio/rio-scan.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) NULL pointer dereference

EUVDB-ID: #VU106704

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21941

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the resource_build_scaling_params() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Improper locking

EUVDB-ID: #VU106768

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21943

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the new_device_store(), kfree() and delete_device_store() functions in drivers/gpio/gpio-aggregator.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) Out-of-bounds read

EUVDB-ID: #VU106656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21946

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the parse_sid() and parse_sec_desc() functions in fs/smb/server/smbacl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Improper error handling

EUVDB-ID: #VU106830

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21949

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the arch_get_unmapped_area_common() function in arch/loongarch/mm/mmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Integer overflow

EUVDB-ID: #VU106842

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21963

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Integer overflow

EUVDB-ID: #VU106843

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21964

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Resource management error

EUVDB-ID: #VU106862

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21976

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the hvfb_putmem(), hvfb_ops_damage_area(), hvfb_probe() and hvfb_remove() functions in drivers/video/fbdev/hyperv_fb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Memory leak

EUVDB-ID: #VU106573

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21978

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the hyperv_vmbus_probe() and hyperv_vmbus_remove() functions in drivers/gpu/drm/hyperv/hyperv_drm_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Out-of-bounds read

EUVDB-ID: #VU106651

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21993

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ibft_attr_show_nic() function in drivers/firmware/iscsi_ibft.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Buffer overflow

EUVDB-ID: #VU106864

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21994

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the parse_dacl() function in fs/smb/server/smbacl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Use-after-free

EUVDB-ID: #VU106955

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21999

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the proc_get_inode() function in fs/proc/inode.c, within the proc_create_reg(), proc_create_seq_private() and proc_create_single_data() functions in fs/proc/generic.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Input validation error

EUVDB-ID: #VU107813

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22008

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the regulator_resolve_supply() and _regulator_get_common() functions in drivers/regulator/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Resource management error

EUVDB-ID: #VU107787

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22013

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the kvm_arch_vcpu_load_fp() function in arch/arm64/kvm/fpsimd.c, within the fpsimd_signal_preserve_current_state() function in arch/arm64/kernel/fpsimd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Use-after-free

EUVDB-ID: #VU107675

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22035

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the wakeup_trace_open() function in kernel/trace/trace_sched_wakeup.c, within the irqsoff_trace_open() function in kernel/trace/trace_irqsoff.c, within the graph_trace_close() function in kernel/trace/trace_functions_graph.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Out-of-bounds read

EUVDB-ID: #VU107694

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22038

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sid_to_id() function in fs/smb/server/smbacl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Buffer overflow

EUVDB-ID: #VU107768

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22049

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the arch/loongarch/include/asm/cache.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) NULL pointer dereference

EUVDB-ID: #VU107714

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22066

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the imx_card_probe() function in sound/soc/fsl/imx-card.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Improper locking

EUVDB-ID: #VU107796

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22120

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_setattr() function in fs/ext4/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) NULL pointer dereference

EUVDB-ID: #VU107703

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23136

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the int3402_thermal_probe() function in drivers/thermal/intel/int340x_thermal/int3402_thermal.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) NULL pointer dereference

EUVDB-ID: #VU107696

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38240

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_dp_parse_capabilities() and mtk_dp_wait_hpd_asserted() functions in drivers/gpu/drm/mediatek/mtk_dp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-87.0.0.82

python3-perf: before 6.6.0-87.0.0.82

perf-debuginfo: before 6.6.0-87.0.0.82

perf: before 6.6.0-87.0.0.82

kernel-tools-devel: before 6.6.0-87.0.0.82

kernel-tools-debuginfo: before 6.6.0-87.0.0.82

kernel-tools: before 6.6.0-87.0.0.82

kernel-source: before 6.6.0-87.0.0.82

kernel-headers: before 6.6.0-87.0.0.82

kernel-devel: before 6.6.0-87.0.0.82

kernel-debugsource: before 6.6.0-87.0.0.82

kernel-debuginfo: before 6.6.0-87.0.0.82

bpftool-debuginfo: before 6.6.0-87.0.0.82

bpftool: before 6.6.0-87.0.0.82

kernel: before 6.6.0-87.0.0.82

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1450


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###