openEuler 22.03 LTS SP4 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 18
CVE-ID CVE-2024-46782
CVE-2024-47697
CVE-2024-49569
CVE-2024-50125
CVE-2024-50268
CVE-2024-53057
CVE-2024-53096
CVE-2024-53141
CVE-2024-53148
CVE-2024-53156
CVE-2024-56600
CVE-2024-56601
CVE-2024-56634
CVE-2024-57849
CVE-2024-57900
CVE-2025-21647
CVE-2025-21648
CVE-2025-21667
CWE-ID CWE-416
CWE-125
CWE-667
CWE-401
CWE-20
CWE-119
CWE-476
CWE-835
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 18 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU97496

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46782

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ila_xlat_init_net() and ila_xlat_exit_net() functions in net/ipv6/ila/ila_xlat.c, within the ila_pre_exit_net() and ila_exit_net() functions in net/ipv6/ila/ila_main.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU98920

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47697

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the rtl2830_pid_filter() function in drivers/media/dvb-frontends/rtl2830.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU102946

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49569

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nvme_stop_keep_alive() function in drivers/nvme/host/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU99806

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50125

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SCO_CONN_TIMEOUT(), sco_sock_timeout() and sco_conn_del() functions in net/bluetooth/sco.c, within the bt_sock_unlink() function in net/bluetooth/af_bluetooth.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU100618

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50268

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ucsi_ccg_update_set_new_cam_cmd() function in drivers/usb/typec/ucsi/ucsi_ccg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU100707

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Memory leak

EUVDB-ID: #VU100936

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53096

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the do_munmap(), mmap_region(), vma_set_page_prot() and vms_abort_munmap_vmas() functions in mm/mmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Input validation error

EUVDB-ID: #VU101348

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53141

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Buffer overflow

EUVDB-ID: #VU101927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53148

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the comedi_mmap() function in drivers/comedi/comedi_fops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds read

EUVDB-ID: #VU101911

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53156

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU102016

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56600

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the htons() function in net/ipv6/af_inet6.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU102015

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56601

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the htons() function in net/ipv4/af_inet.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) NULL pointer dereference

EUVDB-ID: #VU102115

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56634

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the grgpio_probe() function in drivers/gpio/gpio-grgpio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU102912

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57849

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free

EUVDB-ID: #VU102903

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57900

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the DEFINE_MUTEX() and ila_add_mapping() functions in net/ipv6/ila/ila_xlat.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds read

EUVDB-ID: #VU103014

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21647

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the cake_ddst(), cake_enqueue() and cake_dequeue() functions in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Buffer overflow

EUVDB-ID: #VU103047

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21648

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nf_ct_alloc_hashtable() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Infinite loop

EUVDB-ID: #VU103595

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21667

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the iomap_write_delalloc_scan() function in fs/iomap/buffered-io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP4

python3-perf-debuginfo: before 5.10.0-250.0.0.154

python3-perf: before 5.10.0-250.0.0.154

perf-debuginfo: before 5.10.0-250.0.0.154

perf: before 5.10.0-250.0.0.154

kernel-tools-devel: before 5.10.0-250.0.0.154

kernel-tools-debuginfo: before 5.10.0-250.0.0.154

kernel-tools: before 5.10.0-250.0.0.154

kernel-source: before 5.10.0-250.0.0.154

kernel-headers: before 5.10.0-250.0.0.154

kernel-devel: before 5.10.0-250.0.0.154

kernel-debugsource: before 5.10.0-250.0.0.154

kernel-debuginfo: before 5.10.0-250.0.0.154

bpftool-debuginfo: before 5.10.0-250.0.0.154

bpftool: before 5.10.0-250.0.0.154

kernel: before 5.10.0-250.0.0.154

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1158


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###