Risk | Low |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2023-52935 CVE-2023-53010 CVE-2025-21780 CVE-2025-21781 CVE-2025-21877 CVE-2025-21898 CVE-2025-21935 CVE-2025-21993 CVE-2025-22035 |
CWE-ID | CWE-416 CWE-119 CWE-399 CWE-369 CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU106174
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52935
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the retract_page_tables() function in mm/khugepaged.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106214
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53010
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the bnxt_ethtool_init() function in drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21780
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the smu_sys_set_pp_table() function in drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21781
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the batadv_v_elp_start_timer() and batadv_v_elp_get_throughput() functions in net/batman-adv/bat_v_elp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21877
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106846
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21898
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the function_stat_show() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106611
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21935
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rio_scan_alloc_net() function in drivers/rapidio/rio-scan.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106651
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21993
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ibft_attr_show_nic() function in drivers/firmware/iscsi_ibft.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107675
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22035
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the wakeup_trace_open() function in kernel/trace/trace_sched_wakeup.c, within the irqsoff_trace_open() function in kernel/trace/trace_irqsoff.c, within the graph_trace_close() function in kernel/trace/trace_functions_graph.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
python3-perf-debuginfo: before 5.10.0-261.0.0.163
python3-perf: before 5.10.0-261.0.0.163
perf-debuginfo: before 5.10.0-261.0.0.163
perf: before 5.10.0-261.0.0.163
kernel-tools-devel: before 5.10.0-261.0.0.163
kernel-tools-debuginfo: before 5.10.0-261.0.0.163
kernel-tools: before 5.10.0-261.0.0.163
kernel-source: before 5.10.0-261.0.0.163
kernel-headers: before 5.10.0-261.0.0.163
kernel-devel: before 5.10.0-261.0.0.163
kernel-debugsource: before 5.10.0-261.0.0.163
kernel-debuginfo: before 5.10.0-261.0.0.163
kernel: before 5.10.0-261.0.0.163
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.