Risk | Low |
Patch available | YES |
Number of vulnerabilities | 37 |
CVE-ID | CVE-2024-53174 CVE-2024-53680 CVE-2024-56635 CVE-2024-56694 CVE-2024-57924 CVE-2024-57951 CVE-2024-57980 CVE-2024-58005 CVE-2024-58020 CVE-2024-58055 CVE-2024-58077 CVE-2024-58078 CVE-2025-21673 CVE-2025-21674 CVE-2025-21680 CVE-2025-21681 CVE-2025-21683 CVE-2025-21691 CVE-2025-21718 CVE-2025-21722 CVE-2025-21734 CVE-2025-21738 CVE-2025-21754 CVE-2025-21756 CVE-2025-21785 CVE-2025-21787 CVE-2025-21791 CVE-2025-21816 CVE-2025-21820 CVE-2025-21823 CVE-2025-21832 CVE-2025-21844 CVE-2025-21846 CVE-2025-21856 CVE-2025-21863 CVE-2025-21887 CVE-2025-21889 |
CWE-ID | CWE-416 CWE-476 CWE-667 CWE-617 CWE-399 CWE-415 CWE-20 CWE-125 CWE-401 CWE-119 CWE-682 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 37 vulnerabilities.
EUVDB-ID: #VU102057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53174
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the c_show() function in net/sunrpc/cache.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53680
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ip_vs_protocol_net_cleanup() and ip_vs_protocol_init() functions in net/netfilter/ipvs/ip_vs_proto.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102026
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56635
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the default_operstate() function in net/core/link_watch.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102157
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56694
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sk_psock_strp_data_ready() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103038
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57924
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the ovl_encode_real_fh() function in fs/overlayfs/copy_up.c, within the show_mark_fhandle() function in fs/notify/fdinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103921
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57951
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hrtimers_prepare_cpu() and hrtimers_cpu_dying() functions in kernel/time/hrtimer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104971
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57980
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uvc_status_init() function in drivers/media/usb/uvc/uvc_status.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105072
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58005
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tpm_is_tpm2_log() and tpm_read_log_acpi() functions in drivers/char/tpm/eventlog/acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58020
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mt_input_configured() function in drivers/hid/hid-multitouch.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105417
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58055
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the usbg_cmd_work() and bot_cmd_work() functions in drivers/usb/gadget/function/f_tcm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105430
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58077
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the _soc_pcm_ret(), __soc_pcm_prepare(), soc_pcm_prepare(), dpcm_be_dai_prepare() and dpcm_set_fe_update_state() functions in sound/soc/soc-pcm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105423
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58078
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DEFINE_MUTEX() and misc_register() functions in drivers/char/misc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103515
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21673
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the clean_demultiplex_info() and cifs_put_tcp_session() functions in fs/smb/client/connect.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103588
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21674
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mlx5e_xfrm_add_state() and mlx5e_xfrm_del_state() functions in drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103582
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21680
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_imix_entries() function in net/core/pktgen.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103591
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21681
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the do_output() function in net/openvswitch/actions.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21683
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the BPF_CALL_4() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103752
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21691
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the SYSCALL_DEFINE4() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104963
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21718
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rose_heartbeat_expiry(), rose_timer_expiry() and rose_idletimer_expiry() functions in net/rose/rose_timer.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104962
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21722
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_clear_dirty_pages() and nilfs_clear_folio_dirty() functions in fs/nilfs2/page.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104975
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21734
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the fastrpc_get_args() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105069
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21738
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ata_pio_sector() function in drivers/ata/libata-sff.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21754
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the btrfs_split_ordered_extent() function in fs/btrfs/ordered-data.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104945
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and __vsock_release() functions in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21785
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the populate_cache_leaves() function in arch/arm64/kernel/cacheinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105035
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21787
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the team_nl_options_set_doit() function in drivers/net/team/team_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104952
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21791
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the include/net/l3mdev.h. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105157
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21816
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the HRTIMER_ACTIVE_SOFT(), DEFINE_PER_CPU(), hrtimer_base_is_online(), lock_hrtimer_base(), raw_spin_unlock(), WRITE_ONCE(), hrtimer_is_hres_enabled() and __hrtimer_start_range_ns() functions in kernel/time/hrtimer.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21820
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cdns_uart_handle_rx(), cdns_uart_isr() and cdns_uart_console_write() functions in drivers/tty/serial/xilinx_uartps.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105149
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21823
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the batadv_v_elp_start_timer(), batadv_v_elp_get_throughput(), batadv_v_elp_throughput_metric_update(), batadv_v_elp_wifi_neigh_probe() and batadv_v_elp_periodic_work() functions in net/batman-adv/bat_v_elp.c, within the batadv_v_hardif_neigh_init() function in net/batman-adv/bat_v.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105429
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21832
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the blkdev_read_iter() function in block/fops.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105659
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21844
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105660
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21846
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the do_acct_process(), acct_pin_kill(), close_work(), encode_float() and fill_ac() functions in kernel/acct.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105653
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21856
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ism_dev_release(), ism_probe(), device_del() and ism_remove() functions in drivers/s390/net/ism_drv.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105676
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21863
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the io_init_req() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106110
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21887
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ovl_link_up() function in fs/overlayfs/copy_up.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106120
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21889
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the perf_event_exec() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
python3-perf-debuginfo: before 6.6.0-85.0.0.90
python3-perf: before 6.6.0-85.0.0.90
perf-debuginfo: before 6.6.0-85.0.0.90
perf: before 6.6.0-85.0.0.90
kernel-tools-devel: before 6.6.0-85.0.0.90
kernel-tools-debuginfo: before 6.6.0-85.0.0.90
kernel-tools: before 6.6.0-85.0.0.90
kernel-source: before 6.6.0-85.0.0.90
kernel-headers: before 6.6.0-85.0.0.90
kernel-devel: before 6.6.0-85.0.0.90
kernel-debugsource: before 6.6.0-85.0.0.90
kernel-debuginfo: before 6.6.0-85.0.0.90
bpftool-debuginfo: before 6.6.0-85.0.0.90
bpftool: before 6.6.0-85.0.0.90
kernel: before 6.6.0-85.0.0.90
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1372
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.