openEuler 22.03 LTS SP3 update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2023-52935
CVE-2023-53010
CVE-2025-21780
CVE-2025-21781
CVE-2025-21877
CVE-2025-21898
CVE-2025-21935
CVE-2025-21993
CVE-2025-22035
CWE-ID CWE-416
CWE-119
CWE-399
CWE-369
CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU106174

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52935

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the retract_page_tables() function in mm/khugepaged.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU106214

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53010

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the bnxt_ethtool_init() function in drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU105057

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21780

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the smu_sys_set_pp_table() function in drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU105077

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21781

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the batadv_v_elp_start_timer() and batadv_v_elp_get_throughput() functions in net/batman-adv/bat_v_elp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource management error

EUVDB-ID: #VU106132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21877

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Division by zero

EUVDB-ID: #VU106846

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21898

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the function_stat_show() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU106611

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21935

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rio_scan_alloc_net() function in drivers/rapidio/rio-scan.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU106651

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21993

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ibft_attr_show_nic() function in drivers/firmware/iscsi_ibft.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU107675

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22035

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the wakeup_trace_open() function in kernel/trace/trace_sched_wakeup.c, within the irqsoff_trace_open() function in kernel/trace/trace_irqsoff.c, within the graph_trace_close() function in kernel/trace/trace_functions_graph.c. A local user can escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

python3-perf-debuginfo: before 5.10.0-261.0.0.163

python3-perf: before 5.10.0-261.0.0.163

perf-debuginfo: before 5.10.0-261.0.0.163

perf: before 5.10.0-261.0.0.163

kernel-tools-devel: before 5.10.0-261.0.0.163

kernel-tools-debuginfo: before 5.10.0-261.0.0.163

kernel-tools: before 5.10.0-261.0.0.163

kernel-source: before 5.10.0-261.0.0.163

kernel-headers: before 5.10.0-261.0.0.163

kernel-devel: before 5.10.0-261.0.0.163

kernel-debugsource: before 5.10.0-261.0.0.163

kernel-debuginfo: before 5.10.0-261.0.0.163

kernel: before 5.10.0-261.0.0.163

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1448


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###