Risk | Low |
Patch available | YES |
Number of vulnerabilities | 31 |
CVE-ID | CVE-2024-36476 CVE-2024-56778 CVE-2024-57802 CVE-2024-57834 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57890 CVE-2024-57894 CVE-2024-57897 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57913 CVE-2024-57938 CVE-2024-57945 CVE-2024-58069 CVE-2024-58080 CVE-2024-58087 CVE-2025-21629 CVE-2025-21639 CVE-2025-21642 CVE-2025-21646 CVE-2025-21654 CVE-2025-21655 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21719 CVE-2025-21750 |
CWE-ID | CWE-476 CWE-908 CWE-401 CWE-416 CWE-190 CWE-667 CWE-388 CWE-399 CWE-125 CWE-617 CWE-682 CWE-119 CWE-362 CWE-20 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 31 vulnerabilities.
EUVDB-ID: #VU102920
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36476
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the send_io_resp_imm() function in drivers/infiniband/ulp/rtrs/rtrs-srv.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102486
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56778
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sti_hqvdp_atomic_check() function in drivers/gpu/drm/sti/sti_hqvdp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102960
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57802
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nr_route_frame() function in net/netrom/nr_route.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105002
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57834
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vidtv_start_streaming() and vidtv_stop_streaming() functions in drivers/media/test-drivers/vidtv/vidtv_bridge.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102893
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57883
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the huge_pmd_share() and huge_pmd_unshare() functions in mm/hugetlb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102909
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zone_reclaimable_pages() function in mm/vmscan.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102894
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57885
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the print_unreferenced() function in mm/kmemleak.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102963
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57890
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the uverbs_request_next_ptr(), ib_uverbs_post_send() and ib_uverbs_unmarshall_recv() functions in drivers/infiniband/core/uverbs_cmd.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102933
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57894
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sco_connect_ind() and sco_connect_cfm() functions in net/bluetooth/sco.c, within the rfcomm_run() and rfcomm_security_cfm() functions in net/bluetooth/rfcomm/core.c, within the l2cap_global_fixed_chan(), l2cap_connect_cfm() and l2cap_disconn_ind() functions in net/bluetooth/l2cap_core.c, within the iso_match() function in net/bluetooth/iso.c, within the DEFINE_RWLOCK(), hci_register_cb() and hci_unregister_cb() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102932
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57897
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the svm_migrate_copy_to_vram() and svm_migrate_copy_to_ram() functions in drivers/gpu/drm/amd/amdkfd/kfd_migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102954
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57901
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the vlan_get_tci() function in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57902
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the packet_current_frame() and vlan_get_tci() functions in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102931
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57903
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sk_setsockopt() function in net/core/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103049
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57913
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the functionfs_bind() function in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103133
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57938
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the sctp_association_init() function in net/sctp/associola.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103119
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57945
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the EXPORT_SYMBOL(), setup_bootmem() and setup_vm() functions in arch/riscv/mm/init.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105395
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58069
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the pcf85063_nvmem_read() function in drivers/rtc/rtc-pcf85063.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105399
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58080
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/dispcc-sm6350.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105671
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58087
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the check_session_id(), smb2_check_user_session(), smb2_sess_setup(), smb2_session_logoff() and smb3_decrypt_req() functions in fs/ksmbd/smb2pdu.c, within the ksmbd_session_lookup() and ksmbd_session_lookup_slowpath() functions in fs/ksmbd/mgmt/user_session.c, within the ksmbd_get_encryption_key() function in fs/ksmbd/auth.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102981
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21629
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the skb_csum_hwoffload_help() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103026
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21639
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() and proc_sctp_do_rto_min() functions in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103029
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21642
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mptcp_pernet_set_defaults(), mptcp_set_scheduler() and proc_scheduler() functions in net/mptcp/ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21646
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the afs_deliver_yfsvl_get_cell_name() function in fs/afs/vlclient.c, within the afs_vl_get_cell_name() and yfs_check_canonical_cell_name() functions in fs/afs/vl_alias.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21654
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the ovl_connect_layer(), ovl_check_encode_origin(), ovl_dentry_to_fid() and ovl_encode_fh() functions in fs/overlayfs/export.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21655
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the io_queue_deferred() and io_eventfd_ops() functions in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21660
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ksmbd_vfs_kern_path_locked() function in fs/smb/server/vfs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21662
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cmd_work_handler() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21663
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the MAC_SBD_INTR BIT(), tegra_mgbe_resume() and tegra_mgbe_probe() functions in drivers/net/ethernet/stmicro/stmmac/dwmac-tegra.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103120
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21664
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_first_thin() function in drivers/md/dm-thin.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105081
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21719
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the list_for_each_entry() function in net/ipv4/ipmr_base.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21750
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the brcmf_of_probe() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/of.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS
python3-perf-debuginfo: before 6.6.0-83.0.0.77
python3-perf: before 6.6.0-83.0.0.77
perf-debuginfo: before 6.6.0-83.0.0.77
perf: before 6.6.0-83.0.0.77
kernel-tools-devel: before 6.6.0-83.0.0.77
kernel-tools-debuginfo: before 6.6.0-83.0.0.77
kernel-tools: before 6.6.0-83.0.0.77
kernel-source: before 6.6.0-83.0.0.77
kernel-headers: before 6.6.0-83.0.0.77
kernel-devel: before 6.6.0-83.0.0.77
kernel-debugsource: before 6.6.0-83.0.0.77
kernel-debuginfo: before 6.6.0-83.0.0.77
bpftool-debuginfo: before 6.6.0-83.0.0.77
bpftool: before 6.6.0-83.0.0.77
kernel: before 6.6.0-83.0.0.77
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1320
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.