Risk | Low |
Patch available | YES |
Number of vulnerabilities | 23 |
CVE-ID | CVE-2024-58093 CVE-2024-58094 CVE-2024-58099 CVE-2025-21635 CVE-2025-21924 CVE-2025-21948 CVE-2025-21957 CVE-2025-21979 CVE-2025-22010 CVE-2025-22014 CVE-2025-22015 CVE-2025-22027 CVE-2025-22040 CVE-2025-22041 CVE-2025-22044 CVE-2025-22045 CVE-2025-22048 CVE-2025-22072 CVE-2025-22095 CVE-2025-22113 CVE-2025-22121 CVE-2025-22125 CVE-2025-37893 |
CWE-ID | CWE-416 CWE-20 CWE-476 CWE-399 CWE-667 CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 23 vulnerabilities.
EUVDB-ID: #VU107678
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58093
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pcie_aspm_exit_link_state() function in drivers/pci/pcie/aspm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107807
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58094
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the jfs_truncate_nolock() function in fs/jfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108057
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58099
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vmxnet3_xdp_xmit_frame() function in drivers/net/vmxnet3/vmxnet3_xdp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103022
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21635
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ATOMIC_INIT(), sizeof(), rds_tcp_sysctl_reset() and rds_tcp_skbuf_handler() functions in net/rds/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106852
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21924
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hclge_ptp_init() function in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106674
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21948
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the appleir_raw_event() function in drivers/hid/hid-appleir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106695
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21957
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla1280_64bit_start_scsi() function in drivers/scsi/qla1280.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106640
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21979
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cfg80211_dev_free() function in net/wireless/core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107750
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22010
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hem_list_alloc_root_bt(), hns_roce_hem_list_request() and hns_roce_hem_list_find_mtt() functions in drivers/infiniband/hw/hns/hns_roce_hem.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107751
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22014
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pdr_locator_new_server() function in drivers/soc/qcom/pdr_interface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107730
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22015
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the folio_migrate_mapping() function in mm/migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107717
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22027
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the streamzap_disconnect() function in drivers/media/rc/streamzap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107673
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22040
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_session_logoff() function in fs/smb/server/smb2pdu.c, within the ksmbd_expire_session(), ksmbd_sessions_deregister(), ksmbd_user_session_put() and __session_create() functions in fs/smb/server/mgmt/user_session.c, within the ksmbd_get_encryption_key() function in fs/smb/server/auth.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107672
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22041
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ksmbd_sessions_deregister() function in fs/smb/server/mgmt/user_session.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107784
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22044
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107755
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22045
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the arch/x86/include/asm/tlbflush.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107783
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22048
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the build_insn() function in arch/loongarch/net/bpf_jit.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107649
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22072
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak in arch/powerpc/platforms/cell/spufs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107778
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22095
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the brcm_pcie_add_bus() function in drivers/pci/controller/pcie-brcmstb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107736
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22113
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_handle_error(), ext4_put_super() and ext4_load_and_init_journal() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107663
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22121
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __ext4_xattr_check_block(), __xattr_check_inode(), ext4_xattr_ibody_get(), ext4_xattr_ibody_list(), ext4_get_inode_usage(), ext4_xattr_ibody_find() and sizeof() functions in fs/ext4/xattr.c, within the ext4_iget_extra_inode() function in fs/ext4/inode.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107741
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22125
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the raid10_read_request() and raid10_write_one_disk() functions in drivers/md/raid10.c, within the raid1_read_request() and raid1_write_request() functions in drivers/md/raid1.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107735
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37893
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the build_prologue() function in arch/loongarch/net/bpf_jit.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-89.0.0.83
python3-perf: before 6.6.0-89.0.0.83
perf-debuginfo: before 6.6.0-89.0.0.83
perf: before 6.6.0-89.0.0.83
kernel-tools-devel: before 6.6.0-89.0.0.83
kernel-tools-debuginfo: before 6.6.0-89.0.0.83
kernel-tools: before 6.6.0-89.0.0.83
kernel-source: before 6.6.0-89.0.0.83
kernel-headers: before 6.6.0-89.0.0.83
kernel-devel: before 6.6.0-89.0.0.83
kernel-debugsource: before 6.6.0-89.0.0.83
kernel-debuginfo: before 6.6.0-89.0.0.83
bpftool-debuginfo: before 6.6.0-89.0.0.83
bpftool: before 6.6.0-89.0.0.83
kernel: before 6.6.0-89.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.