Risk | Low |
Patch available | YES |
Number of vulnerabilities | 53 |
CVE-ID | CVE-2024-26952 CVE-2024-26954 CVE-2024-49998 CVE-2024-50221 CVE-2024-50304 CVE-2024-53051 CVE-2024-53109 CVE-2024-53113 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53124 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53140 CVE-2024-53145 CVE-2024-53201 CVE-2024-53207 CVE-2024-53209 CVE-2024-53223 CVE-2024-53237 CVE-2024-54193 CVE-2024-56557 CVE-2024-56567 CVE-2024-56590 CVE-2024-56614 CVE-2024-56623 CVE-2024-56640 CVE-2024-56641 CVE-2024-56653 CVE-2024-56677 CVE-2024-56687 CVE-2024-56688 CVE-2024-56701 CVE-2024-56718 CVE-2024-56729 CVE-2024-56758 CVE-2024-56769 CVE-2024-56779 CVE-2024-57809 CVE-2024-57874 CVE-2024-57892 CVE-2024-57906 CVE-2024-57910 CVE-2024-57917 CVE-2024-57922 CVE-2024-57926 CVE-2025-21632 CVE-2025-21658 CVE-2025-21670 |
CWE-ID | CWE-125 CWE-476 CWE-667 CWE-399 CWE-401 CWE-369 CWE-366 CWE-682 CWE-416 CWE-415 CWE-190 CWE-20 CWE-119 CWE-388 CWE-617 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 53 vulnerabilities.
EUVDB-ID: #VU90317
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26952
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to an out-of-bounds read error within the smb2_tree_connect(), smb2_open(), smb2_query_dir(), smb2_get_ea(), smb2_set_info_file(), smb2_set_info(), fsctl_pipe_transceive() and smb2_ioctl() functions in fs/smb/server/smb2pdu.c, within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90321
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26954
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98944
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49998
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and dsa_switch_shutdown() functions in net/dsa/dsa.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100170
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50221
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vangogh_tables_init() function in drivers/gpu/drm/amd/pm/swsmu/smu11/vangogh_ppt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100717
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50304
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip_tunnel_find() function in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100710
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53051
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_hdcp_read_valid_bksv() function in drivers/gpu/drm/i915/display/intel_hdcp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53109
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the delete_vma_from_mm() function in mm/nommu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53113
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the alloc_pages_bulk_noprof() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101098
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53119
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the virtio_transport_recv_listen() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101105
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53120
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_tc_ct_entry_add_rule() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101099
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53121
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the lookup_fte_locked() function in drivers/net/ethernet/mellanox/mlx5/core/fs_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101111
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53122
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the mptcp_rcv_space_adjust() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101112
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53123
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the mptcp_recvmsg() and pr_debug() functions in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101113
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53124
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the tcp_v6_do_rcv() function in net/ipv6/tcp_ipv6.c, within the dccp_v6_do_rcv() function in net/dccp/ipv6.c. A local user can corrupt data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101228
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53135
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the module_param() function in arch/x86/kvm/vmx/vmx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101234
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53138
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the tx_sync_info_get(), mlx5e_ktls_tx_handle_resync_dump_comp() and mlx5e_ktls_tx_handle_ooo() functions in drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101223
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53139
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sctp_v6_available() function in net/sctp/ipv6.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101230
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53140
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the netlink_skb_set_owner_r(), netlink_sock_destruct(), deferred_put_nlk_sk() and netlink_release() functions in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101920
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53145
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the setup_physmem() function in arch/um/kernel/physmem.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53201
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53207
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mgmt_set_discoverable_complete(), mgmt_set_connectable_complete(), set_ssp_complete(), set_name_complete(), set_default_phy_complete(), start_discovery_complete(), stop_discovery_complete() and read_local_oob_ext_data_complete() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53209
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bnxt_set_rx_skb_mode() and bnxt_change_mtu() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102250
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53223
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the to_mtmips_clk(), mt76x8_cpu_recalc_rate(), CLK_BASE() and ARRAY_SIZE() functions in drivers/clk/ralink/clk-mtmips.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53237
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102993
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54193
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ivpu_pm_init() and ivpu_pm_enable() functions in drivers/accel/ivpu/ivpu_pm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102213
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56557
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the __aligned() function in drivers/iio/adc/ad7923.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102216
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56567
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102281
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56590
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_tx_work() and hci_acldata_packet() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56614
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the xsk_map_delete_elem() function in net/xdp/xskmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102023
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56623
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102027
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56640
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smc_listen_out() and smc_listen_work() functions in net/smc/af_smc.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102228
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56641
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102032
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56653
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btmtk_process_coredump() function in drivers/bluetooth/btmtk.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102010
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56677
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the setup_arch() function in arch/powerpc/kernel/setup-common.c, within the fadump_cma_init() and fadump_reserve_mem() functions in arch/powerpc/kernel/fadump.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56687
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the musb_free_request() function in drivers/usb/musb/musb_gadget.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56688
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dtl_worker_enable() and dtl_worker_disable() functions in arch/powerpc/platforms/pseries/lpar.c, within the dtl_enable() and dtl_disable() functions in arch/powerpc/platforms/pseries/dtl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56718
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the smcr_link_down_cond_sched() and smc_link_down_work() functions in net/smc/smc_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101985
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56729
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the spin_lock() function in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102398
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56758
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the relocate_one_folio() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102401
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56769
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the MODULE_PARM_DESC() function in drivers/media/dvb-frontends/dib3000mb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102477
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56779
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the release_open_stateid(), spin_lock() and nfsd4_process_open2() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102957
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57809
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the IMX_PCIE_FLAG_HAS_SERDES BIT(), imx_pcie_suspend_noirq() and imx_pcie_resume_noirq() functions in drivers/pci/controller/dwc/pci-imx6.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102897
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57874
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tagged_addr_ctrl_get() and tagged_addr_ctrl_set() functions in arch/arm64/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102905
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57892
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103002
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57906
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ads8688_trigger_handler() function in drivers/iio/adc/ti-ads8688.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57910
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vcnl4035_trigger_consumer_handler() function in drivers/iio/light/vcnl4035.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103478
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57917
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to an unspecified issue in drivers/base/topology.c. A local user can gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57922
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the drivers/gpu/drm/amd/display/dc/dml/dml_inline_defs.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103010
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57926
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_dev_put() function in drivers/gpu/drm/mediatek/mtk_drm_drv.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103009
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21632
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ssp_get() function in arch/x86/kernel/fpu/regset.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103122
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21658
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scrub_find_fill_first_stripe() function in fs/btrfs/scrub.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103584
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21670
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vsock_bpf_recvmsg() function in net/vmw_vsock/vsock_bpf.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-76.0.0.80
python3-perf: before 6.6.0-76.0.0.80
perf-debuginfo: before 6.6.0-76.0.0.80
perf: before 6.6.0-76.0.0.80
kernel-tools-devel: before 6.6.0-76.0.0.80
kernel-tools-debuginfo: before 6.6.0-76.0.0.80
kernel-tools: before 6.6.0-76.0.0.80
kernel-source: before 6.6.0-76.0.0.80
kernel-headers: before 6.6.0-76.0.0.80
kernel-devel: before 6.6.0-76.0.0.80
kernel-debugsource: before 6.6.0-76.0.0.80
kernel-debuginfo: before 6.6.0-76.0.0.80
bpftool-debuginfo: before 6.6.0-76.0.0.80
bpftool: before 6.6.0-76.0.0.80
kernel: before 6.6.0-76.0.0.80
CPE2.3http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1093
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.