Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 22 |
CVE-ID | CVE-2024-47794 CVE-2024-53079 CVE-2024-53164 CVE-2024-53240 CVE-2024-54680 CVE-2024-56372 CVE-2024-56607 CVE-2024-56655 CVE-2024-56658 CVE-2024-56659 CVE-2024-56717 CVE-2024-56767 CVE-2024-57792 CVE-2024-57804 CVE-2024-57807 CVE-2024-57930 CVE-2024-57946 CVE-2025-21631 CVE-2025-21656 CVE-2025-21689 CVE-2025-21699 CVE-2025-21704 |
CWE-ID | CWE-835 CWE-667 CWE-399 CWE-476 CWE-416 CWE-388 CWE-119 CWE-908 CWE-125 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 22 vulnerabilities.
EUVDB-ID: #VU102971
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47794
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the bpf_attach_type_to_tramp(), __bpf_trampoline_link_prog(), __bpf_trampoline_unlink_prog(), bpf_shim_tramp_link_release() and bpf_trampoline_link_cgroup_shim() functions in kernel/bpf/trampoline.c, within the bpf_tracing_link_release() and bpf_tracing_prog_attach() functions in kernel/bpf/syscall.c, within the bpf_prog_alloc_no_stats() function in kernel/bpf/core.c, within the prog_fd_array_get_ptr() function in kernel/bpf/arraymap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100724
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53079
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the destroy_large_folio() function in mm/page_alloc.c, within the mem_cgroup_move_account(), mem_cgroup_move_charge_pte_range(), uncharge_folio() and mem_cgroup_swapout() functions in mm/memcontrol.c, within the __folio_undo_large_rmappable() and deferred_split_folio() functions in mm/huge_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53164
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101818
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-53240
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote backend to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the guest xen-netfront driver. A a malicious network backend can crash the guest OS.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102916
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54680
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the clean_demultiplex_info(), cifs_get_tcp_session(), cifs_crypto_secmech_release(), cifs_put_tcp_session() and generic_ip_connect() functions in fs/smb/client/connect.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102959
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56372
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the tun_napi_alloc_frags() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102166
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56607
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ath12k_mac_op_set_bitrate_mask() function in drivers/net/wireless/ath/ath12k/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102161
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56655
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nf_tables_newtable(), nf_tables_rule_destroy(), nf_tables_deactivate_set(), __nft_release_basechain_now() and __nft_release_basechain() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102033
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56658
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the LLIST_HEAD(), net_free() and cleanup_net() functions in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102201
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56659
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the include/net/lapb.h. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102242
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56717
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ocelot_ifh_set_basic() function in drivers/net/ethernet/mscc/ocelot.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102397
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56767
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the at_xdmac_prep_dma_memset() function in drivers/dma/at_xdmac.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57792
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the set_charge_current_limit() function in drivers/power/supply/gpio-charger.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57804
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mpi3mr_read_tsu_interval(), mpi3mr_free_mem(), mpi3mr_free_config_dma_memory() and mpi3mr_process_cfg_req() functions in drivers/scsi/mpi3mr/mpi3mr_fw.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57807
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the megasas_aen_polling() function in drivers/scsi/megaraid/megaraid_sas_base.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103136
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57930
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the process_string() function in kernel/trace/trace_events.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57946
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the virtblk_remove() and virtblk_restore() functions in drivers/block/virtio_blk.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103011
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21631
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_waker_bfqq() function in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21656
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the drivetemp_scsi_command() function in drivers/hwmon/drivetemp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103742
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21689
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qt2_process_read_urb() function in drivers/usb/serial/quatech2.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103923
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21699
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the do_gfs2_set_flags() function in fs/gfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104139
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21704
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the acm_process_notification() and acm_ctrl_irq() functions in drivers/usb/class/cdc-acm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-79.0.0.84
python3-perf: before 6.6.0-79.0.0.84
perf-debuginfo: before 6.6.0-79.0.0.84
perf: before 6.6.0-79.0.0.84
kernel-tools-devel: before 6.6.0-79.0.0.84
kernel-tools-debuginfo: before 6.6.0-79.0.0.84
kernel-tools: before 6.6.0-79.0.0.84
kernel-source: before 6.6.0-79.0.0.84
kernel-headers: before 6.6.0-79.0.0.84
kernel-devel: before 6.6.0-79.0.0.84
kernel-debugsource: before 6.6.0-79.0.0.84
kernel-debuginfo: before 6.6.0-79.0.0.84
bpftool-debuginfo: before 6.6.0-79.0.0.84
bpftool: before 6.6.0-79.0.0.84
kernel: before 6.6.0-79.0.0.84
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1205
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.