Risk | Low |
Patch available | YES |
Number of vulnerabilities | 143 |
CVE-ID | CVE-2023-52887 CVE-2024-36013 CVE-2024-36021 CVE-2024-38540 CVE-2024-38547 CVE-2024-39292 CVE-2024-39497 CVE-2024-40942 CVE-2024-41017 CVE-2024-41022 CVE-2024-41027 CVE-2024-41034 CVE-2024-41055 CVE-2024-41065 CVE-2024-41070 CVE-2024-41078 CVE-2024-41081 CVE-2024-41089 CVE-2024-41095 CVE-2024-41097 CVE-2024-42076 CVE-2024-42077 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42087 CVE-2024-42089 CVE-2024-42090 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42098 CVE-2024-42106 CVE-2024-42119 CVE-2024-42124 CVE-2024-42137 CVE-2024-42143 CVE-2024-42145 CVE-2024-42148 CVE-2024-42244 CVE-2024-42246 CVE-2024-42281 CVE-2024-42288 CVE-2024-42304 CVE-2024-42310 CVE-2024-42318 CVE-2024-43839 CVE-2024-43854 CVE-2024-43879 CVE-2024-44944 CVE-2024-45006 CVE-2024-46707 CVE-2024-46770 CVE-2024-46828 CVE-2024-46848 CVE-2024-47670 CVE-2024-49938 CVE-2024-49944 CVE-2024-49952 CVE-2024-49959 CVE-2024-49963 CVE-2024-50073 CVE-2024-50133 CVE-2024-50142 CVE-2024-50167 CVE-2024-50168 CVE-2024-50251 CVE-2024-53050 CVE-2024-53099 CVE-2024-53101 CVE-2024-53128 CVE-2024-53150 CVE-2024-53155 CVE-2024-53157 CVE-2024-53158 CVE-2024-53159 CVE-2024-53160 CVE-2024-53171 CVE-2024-53180 CVE-2024-53187 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53196 CVE-2024-53203 CVE-2024-53213 CVE-2024-53215 CVE-2024-53218 CVE-2024-53219 CVE-2024-53224 CVE-2024-53226 CVE-2024-53229 CVE-2024-53231 CVE-2024-53234 CVE-2024-53239 CVE-2024-53241 CVE-2024-55639 CVE-2024-56543 CVE-2024-56546 CVE-2024-56549 CVE-2024-56562 CVE-2024-56570 CVE-2024-56572 CVE-2024-56582 CVE-2024-56583 CVE-2024-56585 CVE-2024-56586 CVE-2024-56592 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56605 CVE-2024-56609 CVE-2024-56613 CVE-2024-56619 CVE-2024-56622 CVE-2024-56626 CVE-2024-56631 CVE-2024-56633 CVE-2024-56638 CVE-2024-56649 CVE-2024-56654 CVE-2024-56660 CVE-2024-56662 CVE-2024-56663 CVE-2024-56667 CVE-2024-56672 CVE-2024-56679 CVE-2024-56691 CVE-2024-56720 CVE-2024-56726 CVE-2024-56739 CVE-2024-56742 CVE-2024-56745 CVE-2024-56747 CVE-2024-56755 CVE-2024-56756 CVE-2024-56759 CVE-2024-56763 CVE-2015-3290 |
CWE-ID | CWE-388 CWE-416 CWE-665 CWE-125 CWE-476 CWE-399 CWE-119 CWE-401 CWE-20 CWE-908 CWE-96 CWE-667 CWE-835 CWE-843 CWE-682 CWE-191 CWE-366 CWE-415 CWE-1037 CWE-264 |
Exploitation vector | Local |
Public exploit |
Public exploit code for vulnerability #69 is available. Vulnerability #74 is being exploited in the wild. Public exploit code for vulnerability #143 is available. |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 143 vulnerabilities.
EUVDB-ID: #VU95018
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52887
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the j1939_xtp_rx_rts_session_new() function in net/can/j1939/transport.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36013
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_command_rej(), l2cap_connect() and l2cap_chan_unlock() functions in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36021
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the hclge_init_ae_dev() and hclge_comm_cmd_uninit() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92331
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38540
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bnxt_qplib_create_qp() function in drivers/infiniband/hw/bnxt_re/qplib_fp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92350
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38547
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the load_video_binaries() function in drivers/staging/media/atomisp/pci/sh_css.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93178
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39292
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the register_winch_irq() function in arch/um/drivers/line.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94313
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39497
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40942
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mesh_path_discard_frame() function in net/mac80211/mesh_pathtbl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41017
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __jfs_getxattr() and jfs_listxattr() functions in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95022
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41022
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the sdma_v4_0_process_trap_irq() function in drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95071
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41027
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the userfaultfd_api() function in fs/userfaultfd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95020
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41034
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nilfs_dotdot() function in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94979
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41055
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/linux/mmzone.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94926
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41065
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alloc_dispatch_log_kmem_cache() function in arch/powerpc/platforms/pseries/setup.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94942
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41070
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41078
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the btrfs_quota_disable() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41081
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94971
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41089
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_hd_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94966
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41095
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_ld_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95067
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41097
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cxacru_bind() function in drivers/usb/atm/cxacru.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42076
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the MODULE_ALIAS() and j1939_send_one() functions in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95068
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42077
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ocfs2_extend_trans() function in fs/ocfs2/journal.c, within the ocfs2_dio_end_io_write() function in fs/ocfs2/aops.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42080
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rdma_restrack_init() and type2str() functions in drivers/infiniband/core/restrack.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42082
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the __xdp_reg_mem_model() function in net/core/xdp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95052
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42084
CWE-ID:
CWE-96 - Improper Neutralization of Directives in Statically Saved Code (\'Static Code Injection\')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
In the Linux kernel, the following vulnerability has been resolved: ftruncate: pass a signed offset The old ftruncate() syscall, using the 32-bit off_t misses a sign extension when called in compat mode on 64-bit architectures. As a result, passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB. Changing the type of the compat syscall to the signed compat_off_t changes the behavior so it instead returns -EINVAL. The native entry point, the truncate() syscall and the corresponding loff_t based variants are all correct already and do not suffer from this mistake.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95066
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42087
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ili9881c_prepare() and ili9881c_unprepare() functions in drivers/gpu/drm/panel/panel-ilitek-ili9881c.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94964
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42089
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fsl_asoc_card_probe() function in sound/soc/fsl/fsl-asoc-card.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94988
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42090
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the create_pinctrl() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95000
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42092
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the davinci_gpio_probe() function in drivers/gpio/gpio-davinci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95039
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42093
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dpaa2_eth_xdp_xmit() and update_xps() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95040
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42094
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the iucv_setmask_mp() and iucv_cpu_online() functions in net/iucv/iucv.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95101
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42095
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the uart_write() and omap8250_irq() functions in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42096
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the profile_pc() function in arch/x86/kernel/time.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95100
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42098
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ecdh_set_secret() function in crypto/ecdh.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95024
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42106
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the inet_diag_dump_compat() and inet_diag_get_exact_compat() functions in net/ipv4/inet_diag.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95015
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42119
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the find_first_free_audio() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95097
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42124
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qedf_execute_tmf() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94931
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42137
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qca_serdev_shutdown() function in drivers/bluetooth/hci_qca.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94951
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42143
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the orangefs_statfs() function in fs/orangefs/super.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42145
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94952
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42148
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/ethernet/broadcom/bnx2x/bnx2x.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42244
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mos7840_port_remove() function in drivers/usb/serial/mos7840.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95515
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42246
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the xs_tcp_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42281
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bpf_skb_net_grow() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96177
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42288
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the qla2x00_number_of_exch() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96164
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42304
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the __ext4_read_dirblock(), ext4_empty_dir() and ext4_get_first_dir_block() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42310
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdv_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/cdv_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42318
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hook_cred_prepare() and hook_cred_free() functions in security/landlock/cred.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96197
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43839
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bnad_tx_msix_register() and bnad_rx_msix_register() functions in drivers/net/ethernet/brocade/bna/bnad.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96099
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bio_integrity_prep() function in block/bio-integrity.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96304
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43879
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cfg80211_calculate_bitrate_he() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96639
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44944
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96852
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45006
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xhci_configure_endpoint() and xhci_setup_device() functions in drivers/usb/host/xhci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97256
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46707
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the access_gic_sgi() function in arch/arm64/kvm/sys_regs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97520
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46770
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ice_prepare_for_reset(), ice_update_pf_netdev_link() and ice_rebuild() functions in drivers/net/ethernet/intel/ice/ice_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97786
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46828
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97820
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46848
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the adl_get_hybrid_cpu_type() and intel_pmu_init() functions in arch/x86/events/intel/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98365
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47670
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_listxattr(), ocfs2_xattr_find_entry(), ocfs2_xattr_ibody_get(), ocfs2_xattr_ibody_find() and ocfs2_xattr_block_find() functions in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99041
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ath9k_hif_usb_rx_cb() and ath9k_hif_usb_reg_in_cb() functions in drivers/net/wireless/ath/ath9k/hif_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98953
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49944
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49952
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nf_dup_ipv6_route() and nf_dup_ipv6() functions in net/ipv6/netfilter/nf_dup_ipv6.c, within the nf_dup_ipv4() function in net/ipv4/netfilter/nf_dup_ipv4.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99017
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49959
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __releases() function in fs/jbd2/checkpoint.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49963
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99442
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50073
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gsm_cleanup_mux() function in drivers/tty/n_gsm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99822
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50133
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the stack_top() function in arch/loongarch/kernel/process.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100081
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50142
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the verify_newsa_info() function in net/xfrm/xfrm_user.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100053
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50167
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the be_xmit() function in drivers/net/ethernet/emulex/benet/be_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50168
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sun3_82586_send_packet() function in drivers/net/ethernet/i825xx/sun3_82586.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100202
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2024-50251
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the nft_payload_set_eval() function in net/netfilter/nft_payload.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU100709
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53050
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_dp_hdcp2_get_capability() function in drivers/gpu/drm/i915/display/intel_dp_hdcp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53099
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bpf_link_show_fdinfo() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100940
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53101
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101227
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53128
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the include/linux/sched/task_stack.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101910
Risk: High
CVSSv4.0: 6.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53150
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU101917
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53155
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_file_write_iter() and ocfs2_file_read_iter() functions in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101914
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53157
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scpi_dvfs_get_info() function in drivers/firmware/arm_scpi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101924
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53158
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the geni_se_clk_tbl_get() function in drivers/soc/qcom/qcom-geni-se.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101925
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53159
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the store_target_temp(), store_temp_tolerance() and store_weight_temp() functions in drivers/hwmon/nct6775-core.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101926
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53160
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the krc_count(), schedule_delayed_monitor_work() and kvfree_call_rcu() functions in kernel/rcu/tree.c. A local user can corrupt data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102059
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53171
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the get_znodes_to_commit() function in fs/ubifs/tnc_commit.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102222
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53180
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the snd_pcm_mmap_data_fault() function in sound/core/pcm_native.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102214
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53187
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the io_pin_pages() function in io_uring/memmap.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53190
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the efuse_write_1byte() and read_efuse_byte() functions in drivers/net/wireless/realtek/rtlwifi/efuse.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53191
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the ath12k_dp_free() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102049
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53194
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pci_slot_release(), pci_bus_get() and make_slot_name() functions in drivers/pci/slot.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102209
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53196
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the kvm_mmio_read_buf() and kvm_handle_mmio_return() functions in arch/arm64/kvm/mmio.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102211
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53203
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the ucsi_ccg_sync_control() function in drivers/usb/typec/ucsi/ucsi_ccg.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53213
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the lan78xx_probe() function in drivers/net/usb/lan78xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102208
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53215
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the svc_rdma_proc_init() function in net/sunrpc/xprtrdma/svc_rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102066
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53218
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the f2fs_do_shutdown() function in fs/f2fs/file.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53219
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the virtio_fs_get_tree() function in fs/fuse/virtio_fs.c, within the fuse_read_args_fill(), fuse_release_user_pages(), fuse_aio_complete_req(), fuse_get_frag_size(), fuse_get_user_pages() and fuse_direct_io() functions in fs/fuse/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53224
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_ib_dev_res_init(), mlx5_ib_stage_delay_drop_cleanup(), mlx5_ib_stage_dev_notifier_init() and STAGE_CREATE() functions in drivers/infiniband/hw/mlx5/main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102142
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53226
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hns_roce_set_page() and hns_roce_map_mr_sg() functions in drivers/infiniband/hw/hns/hns_roce_mr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102217
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53229
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the rxe_requester() function in drivers/infiniband/sw/rxe/rxe_req.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102144
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53231
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cppc_get_cpu_power() function in drivers/cpufreq/cppc_cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102251
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53234
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the z_erofs_load_compact_lcluster() and z_erofs_get_extent_decompressedlen() functions in fs/erofs/zmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102070
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53239
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101817
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53241
CWE-ID:
CWE-1037 - Processor optimization removal or modification of security-critical code
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to gain access to sensitive information.
The vulnerability exists due to implemented mitigations for hardware vulnerabilities related to Xen hypercall page implementation the guest OS is relying on to work might not be fully functional, resulting in e.g. guest user processes being able to read data they ought not have access to.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-55639
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rswitch_device_alloc(), of_node_put() and rswitch_device_free() functions in drivers/net/ethernet/renesas/rswitch.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102252
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56543
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ath12k_mac_peer_cleanup_all() function in drivers/net/wireless/ath/ath12k/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102074
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56546
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xlnx_add_cb_for_suspend() function in drivers/soc/xilinx/xlnx_event_manager.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56549
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cachefiles_ondemand_fd_write_iter() and cachefiles_ondemand_fd_llseek() functions in fs/cachefiles/ondemand.c, within the cachefiles_commit_object() and cachefiles_clean_up_object() functions in fs/cachefiles/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56562
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i3c_master_put_i3c_addrs() function in drivers/i3c/master.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102280
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56570
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56572
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the allocate_buffers_internal() function in drivers/media/platform/allegro-dvt/allegro-core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102045
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56582
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_encoded_read_endio() function in fs/btrfs/inode.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102243
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56583
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the enqueue_dl_entity() function in kernel/sched/deadline.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102169
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56585
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the setup_tlb_handler() function in arch/loongarch/mm/tlb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56586
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the f2fs_write_inode() function in fs/f2fs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102167
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56592
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the htab_elem_free(), free_htab_elem(), alloc_htab_elem(), htab_map_update_elem(), htab_map_delete_elem() and prealloc_lru_pop() functions in kernel/bpf/hashtab.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56594
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the amdgpu_ttm_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56595
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56596
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the jfs_readdir() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56597
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102020
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56605
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102165
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56609
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtw_usb_tx_handler() and rtw_usb_deinit_tx() functions in drivers/net/wireless/realtek/rtw88/usb.c, within the rtw_sdio_deinit_tx() function in drivers/net/wireless/realtek/rtw88/sdio.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56613
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102022
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56619
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_put_page() function in fs/nilfs2/dir.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102283
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56622
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the read_req_latency_avg_show() and write_req_latency_avg_show() functions in drivers/ufs/core/ufs-sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102081
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56626
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the smb2_write() function in fs/smb/server/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102024
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56631
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102025
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56633
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102185
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56638
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nft_inner_parse() and nft_inner_parse_needed() functions in net/netfilter/nft_inner.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102117
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56649
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() function in drivers/net/ethernet/freescale/enetc/enetc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102257
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56654
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the hci_le_create_big_complete_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56660
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dr_domain_add_vport_cap() function in drivers/net/ethernet/mellanox/mlx5/core/steering/sws/dr_domain.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56662
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102187
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56663
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the NLA_POLICY_NESTED_ARRAY() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56667
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the capture_engine() function in drivers/gpu/drm/i915/i915_gpu_error.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102035
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56672
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the blkcg_unpin_online() function in block/blk-cgroup.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102277
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56679
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the otx2_get_max_mtu() function in drivers/net/ethernet/marvell/octeontx2/nic/otx2_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56691
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the wcove_typec_probe() function in drivers/usb/typec/tcpm/wcove.c, within the ARRAY_SIZE(), bxtwc_add_chained_irq_chip() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102266
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56720
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sk_msg_shift_left() and BPF_CALL_4() functions in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102270
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56726
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cn10k_alloc_leaf_profile() function in drivers/net/ethernet/marvell/octeontx2/nic/cn10k.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56739
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtc_timer_do_work() function in drivers/rtc/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56742
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mlx5vf_add_migration_pages() function in drivers/vfio/pci/mlx5/cmd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56745
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the reset_method_store() function in drivers/pci/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56747
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qedi_alloc_and_init_sb() function in drivers/scsi/qedi/qedi_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102265
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56755
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/netfs/fscache_volume.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102008
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_free_host_mem(), __nvme_alloc_host_mem() and kfree() functions in drivers/nvme/host/pci.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102393
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56759
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102404
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56763
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tracing_cpumask_write() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92492
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2015-3290
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to security restrictions bypass within the entry() function in arch/x86/entry/entry_64.s. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-75.0.0.68
python3-perf: before 6.6.0-75.0.0.68
perf-debuginfo: before 6.6.0-75.0.0.68
perf: before 6.6.0-75.0.0.68
kernel-tools-devel: before 6.6.0-75.0.0.68
kernel-tools-debuginfo: before 6.6.0-75.0.0.68
kernel-tools: before 6.6.0-75.0.0.68
kernel-source: before 6.6.0-75.0.0.68
kernel-headers: before 6.6.0-75.0.0.68
kernel-devel: before 6.6.0-75.0.0.68
kernel-debugsource: before 6.6.0-75.0.0.68
kernel-debuginfo: before 6.6.0-75.0.0.68
bpftool-debuginfo: before 6.6.0-75.0.0.68
bpftool: before 6.6.0-75.0.0.68
kernel: before 6.6.0-75.0.0.68
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1078
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.