openEuler 24.03 LTS SP1 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 25
CVE-ID CVE-2024-39282
CVE-2024-45828
CVE-2024-46834
CVE-2024-49569
CVE-2024-50146
CVE-2024-53195
CVE-2024-54683
CVE-2024-56559
CVE-2024-56634
CVE-2024-56647
CVE-2024-56703
CVE-2024-56787
CVE-2024-57801
CVE-2024-57849
CVE-2024-57872
CVE-2024-57893
CVE-2024-57904
CVE-2024-57931
CVE-2024-57949
CVE-2025-21647
CVE-2025-21648
CVE-2025-21653
CVE-2025-21667
CVE-2025-21668
CVE-2025-21694
CWE-ID CWE-399
CWE-476
CWE-125
CWE-667
CWE-20
CWE-416
CWE-401
CWE-269
CWE-119
CWE-835
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 25 vulnerabilities.

1) Resource management error

EUVDB-ID: #VU102972

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39282

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the t7xx_fsm_broadcast_state(), fsm_main_thread() and t7xx_fsm_append_cmd() functions in drivers/net/wwan/t7xx/t7xx_state_monitor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU102922

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45828

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hci_dma_cleanup() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds read

EUVDB-ID: #VU97789

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46834

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ethtool_set_channels() function in net/ethtool/ioctl.c, within the ethtool_get_max_rxfh_channel() function in net/ethtool/common.c, within the ethnl_set_channels() function in net/ethtool/channels.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper locking

EUVDB-ID: #VU102946

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49569

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nvme_stop_keep_alive() function in drivers/nvme/host/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU100071

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50146

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the _mlx5e_remove() function in drivers/net/ethernet/mellanox/mlx5/core/en_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Resource management error

EUVDB-ID: #VU102232

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53195

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the DECLARE_KVM_NVHE_PER_CPU(), kvm_arch_vcpu_postcreate(), kvm_arch_vcpu_run_pid_change(), kvm_vcpu_exit_request() and kvm_arch_vcpu_ioctl_run() functions in arch/arm64/kvm/arm.c, within the get_timer_map() function in arch/arm64/kvm/arch_timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper locking

EUVDB-ID: #VU102937

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54683

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the idletimer_tg_destroy() and idletimer_tg_destroy_v1() functions in net/netfilter/xt_IDLETIMER.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper locking

EUVDB-ID: #VU102171

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56559

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the decay_va_pool_node() and purge_vmap_node() functions in mm/vmalloc.c, within the kasan_depopulate_vmalloc_pte() and kasan_release_vmalloc() functions in mm/kasan/shadow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU102115

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56634

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the grgpio_probe() function in drivers/gpio/gpio-grgpio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Input validation error

EUVDB-ID: #VU102186

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56647

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the icmp_route_lookup() function in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Improper locking

EUVDB-ID: #VU102159

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56703

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the |() function in tools/testing/selftests/net/ipv6_route_update_soft_lockup.sh, within the fib6_select_path(), ip6_route_mpath_notify(), rt6_nlmsg_size(), rt6_fill_node() and inet6_rt_notify() functions in net/ipv6/route.c, within the fib6_del_route() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Resource management error

EUVDB-ID: #VU102495

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56787

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the imx8mq_soc_revision_from_atf(), imx8mq_soc_revision(), imx8mm_soc_uid(), kasprintf(), imx8_soc_init() and kfree() functions in drivers/soc/imx/soc-imx8m.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU102908

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57801

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5_esw_for_each_rep() function in drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c, within the mlx5_esw_ipsec_restore_dest_uplink() function in drivers/net/ethernet/mellanox/mlx5/core/esw/ipsec_fs.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU102912

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57849

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Memory leak

EUVDB-ID: #VU102896

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57872

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ufshcd_pltfrm_remove() function in drivers/ufs/host/ufshcd-pltfrm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds read

EUVDB-ID: #VU102918

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57893

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the DEFINE_SPINLOCK() and snd_seq_oss_synth_sysex() functions in sound/core/seq/oss/seq_oss_synth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Resource management error

EUVDB-ID: #VU103048

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57904

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the at91_ts_register() function in drivers/iio/adc/at91_adc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Improper privilege management

EUVDB-ID: #VU103139

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57931

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the services_compute_xperms_decision() function in security/selinux/ss/services.c. A local user can read and manipulate data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Improper locking

EUVDB-ID: #VU103747

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57949

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the its_irq_set_vcpu_affinity() function in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Out-of-bounds read

EUVDB-ID: #VU103014

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21647

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the cake_ddst(), cake_enqueue() and cake_dequeue() functions in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Buffer overflow

EUVDB-ID: #VU103047

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21648

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nf_ct_alloc_hashtable() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Out-of-bounds read

EUVDB-ID: #VU103016

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21653

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the NLA_POLICY_MAX() function in net/sched/cls_flow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Infinite loop

EUVDB-ID: #VU103595

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21667

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the iomap_write_delalloc_scan() function in fs/iomap/buffered-io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Out-of-bounds read

EUVDB-ID: #VU103512

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21668

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the imx8mp_blk_ctrl_remove() function in drivers/pmdomain/imx/imx8mp-blk-ctrl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Use-after-free

EUVDB-ID: #VU103918

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21694

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __read_vmcore() function in fs/proc/vmcore.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS SP1

python3-perf-debuginfo: before 6.6.0-78.0.0.83

python3-perf: before 6.6.0-78.0.0.83

perf-debuginfo: before 6.6.0-78.0.0.83

perf: before 6.6.0-78.0.0.83

kernel-tools-devel: before 6.6.0-78.0.0.83

kernel-tools-debuginfo: before 6.6.0-78.0.0.83

kernel-tools: before 6.6.0-78.0.0.83

kernel-source: before 6.6.0-78.0.0.83

kernel-headers: before 6.6.0-78.0.0.83

kernel-devel: before 6.6.0-78.0.0.83

kernel-debugsource: before 6.6.0-78.0.0.83

kernel-debuginfo: before 6.6.0-78.0.0.83

bpftool-debuginfo: before 6.6.0-78.0.0.83

bpftool: before 6.6.0-78.0.0.83

kernel: before 6.6.0-78.0.0.83

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###