Risk | Low |
Patch available | YES |
Number of vulnerabilities | 25 |
CVE-ID | CVE-2024-39282 CVE-2024-45828 CVE-2024-46834 CVE-2024-49569 CVE-2024-50146 CVE-2024-53195 CVE-2024-54683 CVE-2024-56559 CVE-2024-56634 CVE-2024-56647 CVE-2024-56703 CVE-2024-56787 CVE-2024-57801 CVE-2024-57849 CVE-2024-57872 CVE-2024-57893 CVE-2024-57904 CVE-2024-57931 CVE-2024-57949 CVE-2025-21647 CVE-2025-21648 CVE-2025-21653 CVE-2025-21667 CVE-2025-21668 CVE-2025-21694 |
CWE-ID | CWE-399 CWE-476 CWE-125 CWE-667 CWE-20 CWE-416 CWE-401 CWE-269 CWE-119 CWE-835 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 25 vulnerabilities.
EUVDB-ID: #VU102972
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39282
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the t7xx_fsm_broadcast_state(), fsm_main_thread() and t7xx_fsm_append_cmd() functions in drivers/net/wwan/t7xx/t7xx_state_monitor.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102922
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45828
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hci_dma_cleanup() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97789
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46834
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ethtool_set_channels() function in net/ethtool/ioctl.c, within the ethtool_get_max_rxfh_channel() function in net/ethtool/common.c, within the ethnl_set_channels() function in net/ethtool/channels.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102946
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49569
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nvme_stop_keep_alive() function in drivers/nvme/host/rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100071
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50146
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the _mlx5e_remove() function in drivers/net/ethernet/mellanox/mlx5/core/en_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102232
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53195
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DECLARE_KVM_NVHE_PER_CPU(), kvm_arch_vcpu_postcreate(), kvm_arch_vcpu_run_pid_change(), kvm_vcpu_exit_request() and kvm_arch_vcpu_ioctl_run() functions in arch/arm64/kvm/arm.c, within the get_timer_map() function in arch/arm64/kvm/arch_timer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102937
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54683
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the idletimer_tg_destroy() and idletimer_tg_destroy_v1() functions in net/netfilter/xt_IDLETIMER.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102171
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56559
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the decay_va_pool_node() and purge_vmap_node() functions in mm/vmalloc.c, within the kasan_depopulate_vmalloc_pte() and kasan_release_vmalloc() functions in mm/kasan/shadow.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102115
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56634
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the grgpio_probe() function in drivers/gpio/gpio-grgpio.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102186
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56647
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the icmp_route_lookup() function in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102159
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56703
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the |() function in tools/testing/selftests/net/ipv6_route_update_soft_lockup.sh, within the fib6_select_path(), ip6_route_mpath_notify(), rt6_nlmsg_size(), rt6_fill_node() and inet6_rt_notify() functions in net/ipv6/route.c, within the fib6_del_route() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102495
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56787
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the imx8mq_soc_revision_from_atf(), imx8mq_soc_revision(), imx8mm_soc_uid(), kasprintf(), imx8_soc_init() and kfree() functions in drivers/soc/imx/soc-imx8m.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102908
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57801
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlx5_esw_for_each_rep() function in drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c, within the mlx5_esw_ipsec_restore_dest_uplink() function in drivers/net/ethernet/mellanox/mlx5/core/esw/ipsec_fs.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102912
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57849
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102896
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57872
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ufshcd_pltfrm_remove() function in drivers/ufs/host/ufshcd-pltfrm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102918
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57893
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEFINE_SPINLOCK() and snd_seq_oss_synth_sysex() functions in sound/core/seq/oss/seq_oss_synth.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103048
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57904
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the at91_ts_register() function in drivers/iio/adc/at91_adc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103139
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57931
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
The vulnerability exists due to improperly imposed permissions within the services_compute_xperms_decision() function in security/selinux/ss/services.c. A local user can read and manipulate data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103747
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57949
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the its_irq_set_vcpu_affinity() function in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103014
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21647
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cake_ddst(), cake_enqueue() and cake_dequeue() functions in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103047
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21648
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nf_ct_alloc_hashtable() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21653
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the NLA_POLICY_MAX() function in net/sched/cls_flow.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103595
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21667
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the iomap_write_delalloc_scan() function in fs/iomap/buffered-io.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21668
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the imx8mp_blk_ctrl_remove() function in drivers/pmdomain/imx/imx8mp-blk-ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103918
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21694
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __read_vmcore() function in fs/proc/vmcore.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-78.0.0.83
python3-perf: before 6.6.0-78.0.0.83
perf-debuginfo: before 6.6.0-78.0.0.83
perf: before 6.6.0-78.0.0.83
kernel-tools-devel: before 6.6.0-78.0.0.83
kernel-tools-debuginfo: before 6.6.0-78.0.0.83
kernel-tools: before 6.6.0-78.0.0.83
kernel-source: before 6.6.0-78.0.0.83
kernel-headers: before 6.6.0-78.0.0.83
kernel-devel: before 6.6.0-78.0.0.83
kernel-debugsource: before 6.6.0-78.0.0.83
kernel-debuginfo: before 6.6.0-78.0.0.83
bpftool-debuginfo: before 6.6.0-78.0.0.83
bpftool: before 6.6.0-78.0.0.83
kernel: before 6.6.0-78.0.0.83
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1160
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.