openEuler 24.03 LTS SP1 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 18
CVE-ID CVE-2024-50140
CVE-2024-53175
CVE-2024-53188
CVE-2024-53200
CVE-2024-56568
CVE-2025-21676
CVE-2025-21919
CVE-2025-22028
CVE-2025-22104
CVE-2025-22109
CVE-2025-22127
CVE-2025-23161
CVE-2025-37738
CVE-2025-37747
CVE-2025-37836
CVE-2025-37903
CVE-2025-37952
CVE-2025-37988
CWE-ID CWE-667
CWE-401
CWE-476
CWE-416
CWE-20
CWE-399
CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 18 vulnerabilities.

1) Improper locking

EUVDB-ID: #VU100076

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50140

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the task_work_add() function in kernel/task_work.c, within the task_tick_mm_cid() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU102000

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53175

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the create_ipc_ns() function in ipc/namespace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU102130

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53188

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ath12k_dp_cc_cleanup() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU102138

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53200

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hwss_setup_dpp() function in drivers/gpu/drm/amd/display/dc/core/dc_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU102127

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56568

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the arm_smmu_probe_device() function in drivers/iommu/arm/arm-smmu/arm-smmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU103581

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21676

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fec_enet_tx() and fec_enet_rx_queue() functions in drivers/net/ethernet/freescale/fec_main.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU106804

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21919

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the child_cfs_rq_on_list() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Resource management error

EUVDB-ID: #VU107785

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22028

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vimc_streamer_pipeline_terminate() function in drivers/media/test-drivers/vimc/vimc-streamer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU107688

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22104

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vnic_add_client_data(), send_login(), handle_query_ip_offload_rsp() and handle_login_rsp() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Memory leak

EUVDB-ID: #VU107653

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22109

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ax25_get_route() function in net/ax25/ax25_route.c, within the ax25_connect() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Improper locking

EUVDB-ID: #VU107740

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22127

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the f2fs_read_multi_pages() function in fs/f2fs/data.c, within the f2fs_compress_ctx_add_page() function in fs/f2fs/compress.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Improper locking

EUVDB-ID: #VU108320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23161

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vmd_pci_read(), vmd_pci_write() and vmd_probe() functions in drivers/pci/controller/vmd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU108241

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37738

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_xattr_inode_dec_ref_all() function in fs/ext4/xattr.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Memory leak

EUVDB-ID: #VU108217

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37747

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the exclusive_event_installable(), _free_event(), perf_remove_from_owner(), list_del(), perf_pending_task(), __perf_event_overflow(), perf_event_alloc(), perf_event_exit_event() and perf_free_event() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Memory leak

EUVDB-ID: #VU108851

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37836

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pci_register_host_bridge() function in drivers/pci/probe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Use-after-free

EUVDB-ID: #VU109501

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37903

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hdcp_update_display(), hdcp_remove_display(), hdcp_reset_display() and update_config() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_hdcp.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU109510

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37952

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __close_file_table_ids() function in fs/smb/server/vfs_cache.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Improper locking

EUVDB-ID: #VU109527

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37988

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the do_lock_mount() and lock_mount() functions in fs/namespace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-95.0.0.99

python3-perf: before 6.6.0-95.0.0.99

perf-debuginfo: before 6.6.0-95.0.0.99

perf: before 6.6.0-95.0.0.99

kernel-tools-devel: before 6.6.0-95.0.0.99

kernel-tools-debuginfo: before 6.6.0-95.0.0.99

kernel-tools: before 6.6.0-95.0.0.99

kernel-source: before 6.6.0-95.0.0.99

kernel-headers: before 6.6.0-95.0.0.99

kernel-devel: before 6.6.0-95.0.0.99

kernel-debugsource: before 6.6.0-95.0.0.99

kernel-debuginfo: before 6.6.0-95.0.0.99

bpftool-debuginfo: before 6.6.0-95.0.0.99

bpftool: before 6.6.0-95.0.0.99

kernel: before 6.6.0-95.0.0.99

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1595


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###