openEuler 24.03 LTS update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 23
CVE-ID CVE-2024-58093
CVE-2024-58094
CVE-2024-58099
CVE-2025-21635
CVE-2025-21924
CVE-2025-21948
CVE-2025-21957
CVE-2025-21979
CVE-2025-22010
CVE-2025-22014
CVE-2025-22015
CVE-2025-22027
CVE-2025-22040
CVE-2025-22041
CVE-2025-22044
CVE-2025-22045
CVE-2025-22048
CVE-2025-22072
CVE-2025-22095
CVE-2025-22113
CVE-2025-22121
CVE-2025-22125
CVE-2025-37893
CWE-ID CWE-416
CWE-20
CWE-476
CWE-399
CWE-667
CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 23 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU107678

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58093

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pcie_aspm_exit_link_state() function in drivers/pci/pcie/aspm.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU107807

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58094

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the jfs_truncate_nolock() function in fs/jfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU108057

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58099

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vmxnet3_xdp_xmit_frame() function in drivers/net/vmxnet3/vmxnet3_xdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU103022

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21635

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ATOMIC_INIT(), sizeof(), rds_tcp_sysctl_reset() and rds_tcp_skbuf_handler() functions in net/rds/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource management error

EUVDB-ID: #VU106852

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21924

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the hclge_ptp_init() function in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer dereference

EUVDB-ID: #VU106674

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21948

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the appleir_raw_event() function in drivers/hid/hid-appleir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) NULL pointer dereference

EUVDB-ID: #VU106695

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21957

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qla1280_64bit_start_scsi() function in drivers/scsi/qla1280.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU106640

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21979

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cfg80211_dev_free() function in net/wireless/core.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper locking

EUVDB-ID: #VU107750

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22010

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hem_list_alloc_root_bt(), hns_roce_hem_list_request() and hns_roce_hem_list_find_mtt() functions in drivers/infiniband/hw/hns/hns_roce_hem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper locking

EUVDB-ID: #VU107751

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22014

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the pdr_locator_new_server() function in drivers/soc/qcom/pdr_interface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU107730

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22015

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the folio_migrate_mapping() function in mm/migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) NULL pointer dereference

EUVDB-ID: #VU107717

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22027

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the streamzap_disconnect() function in drivers/media/rc/streamzap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU107673

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22040

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_session_logoff() function in fs/smb/server/smb2pdu.c, within the ksmbd_expire_session(), ksmbd_sessions_deregister(), ksmbd_user_session_put() and __session_create() functions in fs/smb/server/mgmt/user_session.c, within the ksmbd_get_encryption_key() function in fs/smb/server/auth.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU107672

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22041

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ksmbd_sessions_deregister() function in fs/smb/server/mgmt/user_session.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Resource management error

EUVDB-ID: #VU107784

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22044

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Input validation error

EUVDB-ID: #VU107755

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22045

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the arch/x86/include/asm/tlbflush.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Resource management error

EUVDB-ID: #VU107783

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22048

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the build_insn() function in arch/loongarch/net/bpf_jit.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory leak

EUVDB-ID: #VU107649

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22072

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in arch/powerpc/platforms/cell/spufs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Resource management error

EUVDB-ID: #VU107778

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22095

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the brcm_pcie_add_bus() function in drivers/pci/controller/pcie-brcmstb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Improper locking

EUVDB-ID: #VU107736

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22113

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_handle_error(), ext4_put_super() and ext4_load_and_init_journal() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU107663

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22121

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __ext4_xattr_check_block(), __xattr_check_inode(), ext4_xattr_ibody_get(), ext4_xattr_ibody_list(), ext4_get_inode_usage(), ext4_xattr_ibody_find() and sizeof() functions in fs/ext4/xattr.c, within the ext4_iget_extra_inode() function in fs/ext4/inode.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper locking

EUVDB-ID: #VU107741

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22125

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the raid10_read_request() and raid10_write_one_disk() functions in drivers/md/raid10.c, within the raid1_read_request() and raid1_write_request() functions in drivers/md/raid1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU107735

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37893

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the build_prologue() function in arch/loongarch/net/bpf_jit.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-perf-debuginfo: before 6.6.0-89.0.0.83

python3-perf: before 6.6.0-89.0.0.83

perf-debuginfo: before 6.6.0-89.0.0.83

perf: before 6.6.0-89.0.0.83

kernel-tools-devel: before 6.6.0-89.0.0.83

kernel-tools-debuginfo: before 6.6.0-89.0.0.83

kernel-tools: before 6.6.0-89.0.0.83

kernel-source: before 6.6.0-89.0.0.83

kernel-headers: before 6.6.0-89.0.0.83

kernel-devel: before 6.6.0-89.0.0.83

kernel-debugsource: before 6.6.0-89.0.0.83

kernel-debuginfo: before 6.6.0-89.0.0.83

bpftool-debuginfo: before 6.6.0-89.0.0.83

bpftool: before 6.6.0-89.0.0.83

kernel: before 6.6.0-89.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1463


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###