Risk | Low |
Patch available | YES |
Number of vulnerabilities | 18 |
CVE-ID | CVE-2024-53198 CVE-2024-58100 CVE-2025-21872 CVE-2025-21925 CVE-2025-21966 CVE-2025-22126 CVE-2025-23131 CVE-2025-23148 CVE-2025-23156 CVE-2025-37857 CVE-2025-37916 CVE-2025-37921 CVE-2025-37923 CVE-2025-37926 CVE-2025-37958 CVE-2025-37969 CVE-2025-37995 CVE-2025-40325 |
CWE-ID | CWE-401 CWE-399 CWE-835 CWE-388 CWE-119 CWE-416 CWE-476 CWE-125 CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 18 vulnerabilities.
EUVDB-ID: #VU102006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53198
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xenbus_dev_probe() function in drivers/xen/xenbus/xenbus_probe.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108687
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58100
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the kvfree(), jit_subprogs(), bpf_check_attach_target() and bpf_check() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106128
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21872
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the efi_mokvar_table_init() function in drivers/firmware/efi/mokvar-table.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106812
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21925
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the llc_sap_action_unitdata_ind(), llc_sap_action_send_ui() and llc_sap_action_send_test_c() functions in net/llc/llc_s_ac.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106845
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21966
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the clone_bio() function in drivers/md/dm-flakey.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107662
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22126
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __mddev_put(), md_seq_show(), EXPORT_SYMBOL_GPL(), md_notify_reboot(), md_autostart_arrays() and md_exit() functions in drivers/md/md.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107704
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23131
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the new_lockspace() function in fs/dlm/lockspace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108297
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23148
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the exynos_chipid_probe() function in drivers/soc/samsung/exynos-chipid.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23156
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the fill_buf_mode(), parse_alloc_mode(), fill_profile_level(), parse_profile_level(), fill_caps(), parse_caps(), fill_raw_fmts(), parse_raw_formats(), parse_codecs(), hfi_platform_parser() and hfi_parser() functions in drivers/media/platform/qcom/venus/hfi_parser.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108888
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37857
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the validate_options() function in drivers/scsi/st.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109505
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37916
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pdsc_auxbus_dev_del() function in drivers/net/ethernet/amd/pds_core/auxbus.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109536
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37921
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vxlan_vni_delete_group() function in drivers/net/vxlan/vxlan_vnifilter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109575
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37923
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the tracing_splice_read_pipe() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109508
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37926
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ksmbd_session_rpc_clear_list(), ksmbd_session_rpc_open(), ksmbd_session_rpc_close() and __session_create() functions in fs/smb/server/mgmt/user_session.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109532
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37958
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __split_huge_pmd_locked() and split_huge_pmd_locked() functions in mm/huge_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109557
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37969
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the st_lsm6dsx_read_tagged_fifo() function in drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37995
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the module_kobj_release() function in kernel/params.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107771
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40325
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the raid10_handle_discard() function in drivers/md/raid10.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-96.0.0.100
python3-perf: before 6.6.0-96.0.0.100
perf-debuginfo: before 6.6.0-96.0.0.100
perf: before 6.6.0-96.0.0.100
kernel-tools-devel: before 6.6.0-96.0.0.100
kernel-tools-debuginfo: before 6.6.0-96.0.0.100
kernel-tools: before 6.6.0-96.0.0.100
kernel-source: before 6.6.0-96.0.0.100
kernel-headers: before 6.6.0-96.0.0.100
kernel-devel: before 6.6.0-96.0.0.100
kernel-debugsource: before 6.6.0-96.0.0.100
kernel-debuginfo: before 6.6.0-96.0.0.100
bpftool-debuginfo: before 6.6.0-96.0.0.100
bpftool: before 6.6.0-96.0.0.100
kernel: before 6.6.0-96.0.0.100
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1625
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.