openEuler 24.03 LTS SP1 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 53
CVE-ID CVE-2024-26952
CVE-2024-26954
CVE-2024-49998
CVE-2024-50221
CVE-2024-50304
CVE-2024-53051
CVE-2024-53109
CVE-2024-53113
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53124
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53140
CVE-2024-53145
CVE-2024-53201
CVE-2024-53207
CVE-2024-53209
CVE-2024-53223
CVE-2024-53237
CVE-2024-54193
CVE-2024-56557
CVE-2024-56567
CVE-2024-56590
CVE-2024-56614
CVE-2024-56623
CVE-2024-56640
CVE-2024-56641
CVE-2024-56653
CVE-2024-56677
CVE-2024-56687
CVE-2024-56688
CVE-2024-56701
CVE-2024-56718
CVE-2024-56729
CVE-2024-56758
CVE-2024-56769
CVE-2024-56779
CVE-2024-57809
CVE-2024-57874
CVE-2024-57892
CVE-2024-57906
CVE-2024-57910
CVE-2024-57917
CVE-2024-57922
CVE-2024-57926
CVE-2025-21632
CVE-2025-21658
CVE-2025-21670
CWE-ID CWE-125
CWE-476
CWE-667
CWE-399
CWE-401
CWE-369
CWE-366
CWE-682
CWE-416
CWE-415
CWE-190
CWE-20
CWE-119
CWE-388
CWE-617
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 53 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU90317

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26952

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to an out-of-bounds read error within the smb2_tree_connect(), smb2_open(), smb2_query_dir(), smb2_get_ea(), smb2_set_info_file(), smb2_set_info(), fsctl_pipe_transceive() and smb2_ioctl() functions in fs/smb/server/smb2pdu.c, within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU90321

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26954

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU98944

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49998

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and dsa_switch_shutdown() functions in net/dsa/dsa.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU100170

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50221

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vangogh_tables_init() function in drivers/gpu/drm/amd/pm/swsmu/smu11/vangogh_ppt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU100717

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50304

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ip_tunnel_find() function in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer dereference

EUVDB-ID: #VU100710

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53051

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the intel_hdcp_read_valid_bksv() function in drivers/gpu/drm/i915/display/intel_hdcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU101114

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53109

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the delete_vma_from_mm() function in mm/nommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU101103

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53113

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the alloc_pages_bulk_noprof() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Memory leak

EUVDB-ID: #VU101098

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53119

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the virtio_transport_recv_listen() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU101105

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53120

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_tc_ct_entry_add_rule() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Memory leak

EUVDB-ID: #VU101099

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53121

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the lookup_fte_locked() function in drivers/net/ethernet/mellanox/mlx5/core/fs_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Division by zero

EUVDB-ID: #VU101111

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53122

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the mptcp_rcv_space_adjust() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Division by zero

EUVDB-ID: #VU101112

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53123

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the mptcp_recvmsg() and pr_debug() functions in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Race condition within a thread

EUVDB-ID: #VU101113

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53124

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to a data race within the tcp_v6_do_rcv() function in net/ipv6/tcp_ipv6.c, within the dccp_v6_do_rcv() function in net/dccp/ipv6.c. A local user can corrupt data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU101228

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53135

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the module_param() function in arch/x86/kvm/vmx/vmx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Incorrect calculation

EUVDB-ID: #VU101234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53138

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the tx_sync_info_get(), mlx5e_ktls_tx_handle_resync_dump_comp() and mlx5e_ktls_tx_handle_ooo() functions in drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU101223

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53139

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sctp_v6_available() function in net/sctp/ipv6.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Double free

EUVDB-ID: #VU101230

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53140

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the netlink_skb_set_owner_r(), netlink_sock_destruct(), deferred_put_nlk_sk() and netlink_release() functions in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Integer overflow

EUVDB-ID: #VU101920

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53145

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the setup_physmem() function in arch/um/kernel/physmem.c. A local user can execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU102137

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53201

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Improper locking

EUVDB-ID: #VU102176

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53207

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mgmt_set_discoverable_complete(), mgmt_set_connectable_complete(), set_ssp_complete(), set_name_complete(), set_default_phy_complete(), start_discovery_complete(), stop_discovery_complete() and read_local_oob_ext_data_complete() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) NULL pointer dereference

EUVDB-ID: #VU102134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53209

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the bnxt_set_rx_skb_mode() and bnxt_change_mtu() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Resource management error

EUVDB-ID: #VU102250

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53223

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the to_mtmips_clk(), mt76x8_cpu_recalc_rate(), CLK_BASE() and ARRAY_SIZE() functions in drivers/clk/ralink/clk-mtmips.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU102069

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53237

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Input validation error

EUVDB-ID: #VU102993

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54193

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ivpu_pm_init() and ivpu_pm_enable() functions in drivers/accel/ivpu/ivpu_pm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Buffer overflow

EUVDB-ID: #VU102213

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56557

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the __aligned() function in drivers/iio/adc/ad7923.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Division by zero

EUVDB-ID: #VU102216

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56567

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Input validation error

EUVDB-ID: #VU102281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56590

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hci_tx_work() and hci_acldata_packet() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Out-of-bounds read

EUVDB-ID: #VU102084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56614

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the xsk_map_delete_elem() function in net/xdp/xskmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use-after-free

EUVDB-ID: #VU102023

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56623

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Use-after-free

EUVDB-ID: #VU102027

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56640

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smc_listen_out() and smc_listen_work() functions in net/smc/af_smc.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Resource management error

EUVDB-ID: #VU102228

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56641

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Use-after-free

EUVDB-ID: #VU102032

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56653

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btmtk_process_coredump() function in drivers/bluetooth/btmtk.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use-after-free

EUVDB-ID: #VU102010

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56677

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the setup_arch() function in arch/powerpc/kernel/setup-common.c, within the fadump_cma_init() and fadump_reserve_mem() functions in arch/powerpc/kernel/fadump.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Improper locking

EUVDB-ID: #VU102156

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56687

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the musb_free_request() function in drivers/usb/musb/musb_gadget.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) NULL pointer dereference

EUVDB-ID: #VU102096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56688

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Improper locking

EUVDB-ID: #VU102158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56701

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dtl_worker_enable() and dtl_worker_disable() functions in arch/powerpc/platforms/pseries/lpar.c, within the dtl_enable() and dtl_disable() functions in arch/powerpc/platforms/pseries/dtl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Double free

EUVDB-ID: #VU102191

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56718

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the smcr_link_down_cond_sched() and smc_link_down_work() functions in net/smc/smc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Memory leak

EUVDB-ID: #VU101985

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56729

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the spin_lock() function in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) NULL pointer dereference

EUVDB-ID: #VU102398

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56758

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the relocate_one_folio() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Improper error handling

EUVDB-ID: #VU102401

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56769

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the MODULE_PARM_DESC() function in drivers/media/dvb-frontends/dib3000mb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Memory leak

EUVDB-ID: #VU102477

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56779

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the release_open_stateid(), spin_lock() and nfsd4_process_open2() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Improper error handling

EUVDB-ID: #VU102957

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57809

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the IMX_PCIE_FLAG_HAS_SERDES BIT(), imx_pcie_suspend_noirq() and imx_pcie_resume_noirq() functions in drivers/pci/controller/dwc/pci-imx6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Memory leak

EUVDB-ID: #VU102897

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57874

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tagged_addr_ctrl_get() and tagged_addr_ctrl_set() functions in arch/arm64/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Use-after-free

EUVDB-ID: #VU102905

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57892

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory leak

EUVDB-ID: #VU103002

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57906

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ads8688_trigger_handler() function in drivers/iio/adc/ti-ads8688.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Memory leak

EUVDB-ID: #VU103006

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57910

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vcnl4035_trigger_consumer_handler() function in drivers/iio/light/vcnl4035.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Input validation error

EUVDB-ID: #VU103478

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57917

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to an unspecified issue in drivers/base/topology.c. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Reachable assertion

EUVDB-ID: #VU103037

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57922

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the drivers/gpu/drm/amd/display/dc/dml/dml_inline_defs.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use-after-free

EUVDB-ID: #VU103010

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57926

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_dev_put() function in drivers/gpu/drm/mediatek/mtk_drm_drv.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Memory leak

EUVDB-ID: #VU103009

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21632

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ssp_get() function in arch/x86/kernel/fpu/regset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) NULL pointer dereference

EUVDB-ID: #VU103122

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21658

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the scrub_find_fill_first_stripe() function in fs/btrfs/scrub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) NULL pointer dereference

EUVDB-ID: #VU103584

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21670

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vsock_bpf_recvmsg() function in net/vmw_vsock/vsock_bpf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-76.0.0.80

python3-perf: before 6.6.0-76.0.0.80

perf-debuginfo: before 6.6.0-76.0.0.80

perf: before 6.6.0-76.0.0.80

kernel-tools-devel: before 6.6.0-76.0.0.80

kernel-tools-debuginfo: before 6.6.0-76.0.0.80

kernel-tools: before 6.6.0-76.0.0.80

kernel-source: before 6.6.0-76.0.0.80

kernel-headers: before 6.6.0-76.0.0.80

kernel-devel: before 6.6.0-76.0.0.80

kernel-debugsource: before 6.6.0-76.0.0.80

kernel-debuginfo: before 6.6.0-76.0.0.80

bpftool-debuginfo: before 6.6.0-76.0.0.80

bpftool: before 6.6.0-76.0.0.80

kernel: before 6.6.0-76.0.0.80

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###